Skip to content
(516) 484-5151
FacebookTwitterInstagramGoogle+Linkedin
TCI Technologies
Your Long Island IT Support Company
TCI Technologies
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact

Category Archives: cyber security

The Windows XP Patch Doesn’t Equate to Security

cyber security, cyber security threats, Windows XPBy Aaron MattsonMay 17, 2019Leave a comment

Windows XP reached end of life in 2014, meaning Microsoft stopped issuing critical security updates for it. However, that hasn’t stopped people from using it. Hackers have been exploiting it like crazy ever since, which urged Microsoft to issue an emergency Windows XP patch recently. Here’s why that doesn’t mean it’s safe to start using…

Fileless Malware Attacks: What are They, and How Do You Stop Them?

cyber security, cyber security threats, cyber threats, malware, malware defenseBy Aaron MattsonApril 30, 2019Leave a comment

Traditional, run-of-the-mill malware usually makes its way onto a victim’s computer via the download of an infected file. However, that’s not always the case. Fileless malware attacks use tools that are already on your computer to carry out attacks. Here’s what you need to know.

New Ransomware Relies on PayPal Phishing

cyber security, Phishing, RansomwareBy Aaron MattsonFebruary 5, 2019Leave a comment

An unfortunately clever new form of ransomware uses a PayPal phishing page in an attempt to steal your credit card information. Learn about this cyberattack to recognize it and avoid being scammed by it.

What You Need to Know about Latest DocuSign Scam Email

cyber security, SpoofsBy Aaron MattsonJanuary 10, 2019Leave a comment

Hackers have done a pretty good job at impersonating DocuSign, a leading electronic signature company that many businesses rely on. Learn how to recognize and fight a recent DocuSign scam email that has already claimed thousands of victims.

What is Sandboxing Software, and why is it Important for Cyber Security?

cyber securityBy Aaron MattsonSeptember 25, 2018Leave a comment

When it comes to keeping your business protected, a holistic, integrative approach to cyber security works best. This should include sandboxing software that quarantines and analyzes threats.

How to Create a Strong Password in 2019

cyber security, password management, password protectionBy Aaron MattsonAugust 21, 2018Leave a comment

A strong password is crucial to preventing hackers from stealing personal and business data. Use these rules to improve your password strength and keep hackers away.

Why You Need to Watch for Spear Phishing Attacks

cyber security, PhishingBy Aaron MattsonAugust 7, 2018Leave a comment

Phishing is a dangerous cyberattack that seeks to prey on unsuspecting victims. Spear phishing attacks are even scarier and more dangerous. Learn how to identify and prevent them from compromising your sensitive data.

Why New Technology isn’t Always More Secure

Awesome new technology, cyber securityBy Aaron MattsonJuly 10, 2018Leave a comment

You’d be hard-pressed to find someone who doesn’t view innovation as a good thing, and we’re no different. However, it’s important to understand that with new technology comes new cyber security threats. Here’s why, and what you can do to stay ahead of the hackers.

HIPAA Compliance: A Basic Summary

cyber security, HIPAA ComplianceBy Aaron MattsonApril 3, 2018Leave a comment

The Health Insurance Portability and Accountability Act (HIPAA) mandates that health care organizations protect the privacy of patients’ personal information. Maintaining HIPAA compliance requires several key cyber security measures.

What are Vulnerability Scans and Penetration Testing?

cyber security, Penetration TestingBy Aaron MattsonMarch 13, 2018Leave a comment

The security of your company’s network is not something that should be taken lightly. You may know by now that small, local businesses are no safer from hackers than large businesses. Cyber security practices like penetration testing and vulnerability scans can help keep your network safe.

12345
© TCI Technologies 2025 | Web Design by Fat Guy Media | Privacy Policy
Go to Top