Skip to content
(516) 484-5151
FacebookTwitterInstagramGoogle+Linkedin
TCI Technologies
Your Long Island IT Support Company
TCI Technologies
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact

Category Archives: cyber security

7 of the Worst Data Breaches and Cyberattacks of 2019

Cyber Attacks, cyber security, cyber threats, Cybersecurity, Data BreachBy Aaron MattsonDecember 26, 2019Leave a comment

With the year coming to an end, it’s time to reflect upon the worst data breaches and cyberattacks of 2019. From theft of medical data to corporate account credentials, here they are (in no particular order).

What 2020 Cyber Security Trends We Expect to See

cyber securityBy Aaron MattsonDecember 12, 2019Leave a comment

Thanks to ever-evolving threats, cyber security is an ever-evolving industry. New and improved software and defense methods are constantly being created to keep businesses and individuals alike protected from the bad guys. Read up on these 2020 cyber security trends to make sure you’re up to speed.

7 Common Phishing Emails to Watch For

cyber security, Email Security, Phishing EmailsBy Aaron MattsonNovember 21, 2019Leave a comment

Phishing is a highly-effective cyberattack, which has led hackers to use it more and more over the last few years. Learn how to recognize common phishing emails so you can avoid them at all costs.

4 Common Holiday Cyberattacks to Avoid this Season

cyber security, Cyberattacks, Holiday ShoppingBy Aaron MattsonNovember 7, 2019Leave a comment

The amount of money that consumers spend online has been steadily growing each year. There’s often a dramatic increase each November and December—the beginning of holiday shopping season. Watch out for these common holiday cyberattacks, which can target individuals and businesses alike.

Should You Pay Ransomware?

cyber security, RansomwareBy Aaron MattsonOctober 17, 2019Leave a comment

Ransomware is one of the scariest cyberattacks to deal with. Typically, a big, alarming message pops up on your computer, alerting you that all of your files have been locked and will be permanently deleted unless you pay a ransom. In this blog, we’ll discuss whether or not to pay ransomware.

Nodersok Malware Turning Windows PCs into ‘Zombies’

cyber security, malware, malware defenseBy Aaron MattsonOctober 3, 2019Leave a comment

Microsoft recently discovered a new strain of fileless malware that essentially hijacks PCs and turns them into hubs for carrying out further malicious activity. Here’s what we know about Nodersok malware so far.

What are Steganography Attacks, and Are they a Huge Threat?

cyber security, Cyberattacks, Steganography AttacksBy Aaron MattsonSeptember 12, 2019Leave a comment

Steganography refers to the act of hiding data in other types of content, such as images, videos, website traffic and more. You can probably guess where we’re going with this: hackers have been using it to carry out cybercrimes. In this blog, we’ll discuss steganography attacks.

Orange County Ransomware Attack Delayed Start of School Year

cyber security, RansomwareBy Aaron MattsonSeptember 4, 2019Leave a comment

The Monroe-Woodbury Central School District of Central Valley, New York emailed parents on Tuesday, announcing that the school year would start a day late, on Thursday, September 5, thanks to a ransomware attack.

5 Cyber Security Stats Businesses Should Know

cyber security, cyber security threatsBy Aaron MattsonAugust 22, 2019Leave a comment

Cyber security can cause both short- and long-term issues for businesses of all sizes. However, many small- to mid-sized companies feel as if they’re not large enough to be targeted by cyberattacks. These cyber security stats might be an eye opener for local business owners.

5 of the Wildest IoT Cyberattacks We’ve Seen

cyber security, Internet of ThingsBy Aaron MattsonAugust 8, 2019Leave a comment

Cyber security experts have been warning for years now that the Internet of Things (IoT), which refers to any internet-connected devices, can easily be exploited by hackers. We’ve seen some pretty crazy IoT attacks during that time. Here are just a few of them.

12345
© TCI Technologies 2025 | Web Design by Fat Guy Media | Privacy Policy
Go to Top