Skip to content
(516) 484-5151
FacebookTwitterInstagramGoogle+Linkedin
TCI Technologies
Your Long Island IT Support Company
TCI Technologies
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact

Category Archives: cyber security threats

cell phone with a smishing scam image on the screen

Have You Been a Victim of a Smishing Scam?

cyber security threatsBy Bryan RiedelApril 15, 2025

Remember when phishing attacks primarily came through email? A more immediate and personal threat has emerged: SMS phishing, also known as “smishing.” As mobile device usage continues to climb, so does the risk of falling victim to these deceptive attacks. Recent statistics indicate that SMS phishing is on the rise and has a much higher…

hacker with questions marks in front of him

How do Hackers Hack: A Look Into Older and Lesser Known Methods

cyber security threats, UncategorizedBy Bryan RiedelJuly 5, 2023

In an increasingly digital world, the threat of hackers accessing personal information is a constant concern. So, how do hackers hack your information? While we know some common tactics, such as phishing emails and data breaches, they employ lesser-known methods to access sensitive data too. From mobile game apps to infected USB drives, there is…

people working in a control room with monitors | security operations center

Why You Need a Security Operations Center in Place for Your Company

cyber security, cyber security threatsBy Bryan RiedelAugust 19, 2022

The rate of cybercrime is increasing daily. Research shows a 31% increase in security attacks from 2020 to 2021. Organizations must ensure that all hands are on deck to secure cyber systems. In 2022, hackers and cybersecurity breaches are more sophisticated and malicious, making intercepting attacks more difficult. According to a report from the World…

Coronavirus Cyber Attacks: Everything You Need to Know

coronavirus, Cyber Attacks, cyber security threatsBy Aaron MattsonMarch 12, 2020Leave a comment

As tensions rise surrounding the global coronavirus pandemic, cyber criminals are gearing up to take advantage. In recent weeks, cyber security firms have noticed an uptick in malicious online activity. Capitalizing off people’s worst fears, these predatory coronavirus cyber attacks are on the rise, so here’s all that we know.

5 Cyber Security Stats Businesses Should Know

cyber security, cyber security threatsBy Aaron MattsonAugust 22, 2019Leave a comment

Cyber security can cause both short- and long-term issues for businesses of all sizes. However, many small- to mid-sized companies feel as if they’re not large enough to be targeted by cyberattacks. These cyber security stats might be an eye opener for local business owners.

The Windows XP Patch Doesn’t Equate to Security

cyber security, cyber security threats, Windows XPBy Aaron MattsonMay 17, 2019Leave a comment

Windows XP reached end of life in 2014, meaning Microsoft stopped issuing critical security updates for it. However, that hasn’t stopped people from using it. Hackers have been exploiting it like crazy ever since, which urged Microsoft to issue an emergency Windows XP patch recently. Here’s why that doesn’t mean it’s safe to start using…

Why Health Care Cyber Security Threats are Among the Most Dangerous

cyber security threats, Cybersecurity, Health CareBy Aaron MattsonMay 14, 2019Leave a comment

The health care industry has evolved for the better thanks to the latest technology that streamlines everything from clerical tasks to patient care. However, along with new technology comes new risks. Health care cyber security threats are real and are evolving at a terrifying pace.

Fileless Malware Attacks: What are They, and How Do You Stop Them?

cyber security, cyber security threats, cyber threats, malware, malware defenseBy Aaron MattsonApril 30, 2019Leave a comment

Traditional, run-of-the-mill malware usually makes its way onto a victim’s computer via the download of an infected file. However, that’s not always the case. Fileless malware attacks use tools that are already on your computer to carry out attacks. Here’s what you need to know.

What You Need to know about KeyPass Ransomware

cyber security threats, Cybersecurity, RansomwareBy Aaron MattsonSeptember 4, 2018Leave a comment

KeyPass ransomware is a global cyberattack that has been gaining more and more traction over the few months. Understand how to identify and prevent this Trojan-style attack to keep your files from becoming permanently inaccessible.

© TCI Technologies 2025 | Web Design by Fat Guy Media | Privacy Policy
Go to Top