Skip to content
(516) 484-5151
FacebookTwitterInstagramGoogle+Linkedin
TCI Technologies
Your Long Island IT Support Company
TCI Technologies
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact

Category Archives: Cybersecurity

How to Avoid Holiday Scams in 2018

Cybersecurity, Holiday ShoppingBy Aaron MattsonNovember 28, 2018Leave a comment

Every year, cybercriminal Grinches rejoice at the fact that they can make some easy money by stealing credit card information from unsuspecting victims. Learn to recognize and avoid holiday scams this year so you don’t have your holidays ruined and your identity stolen.

National Cyber Security Awareness Month: 5 Tips for Businesses

CybersecurityBy Aaron MattsonOctober 17, 2018Leave a comment

October marks National Cyber Security Awareness Month. Online safety in the workplace is a shared responsibility between all levels of employees, from the owners down to the interns. Use these simple tips to stay safe online.

How to Identify a Spam Email vs. a Real Email

Cybersecurity, safety, tech tipsBy Aaron MattsonOctober 2, 2018Leave a comment

We’ve all received spam emails before, and most of us are pretty good at identifying which messages are phony without even opening them. However, there is a sinister breed of spam emails that employ familiar email addresses to send fake messages, enticing even the foremost cyber security experts to open them. It’s called the “spoof…

What You Need to know about KeyPass Ransomware

cyber security threats, Cybersecurity, RansomwareBy Aaron MattsonSeptember 4, 2018Leave a comment

KeyPass ransomware is a global cyberattack that has been gaining more and more traction over the few months. Understand how to identify and prevent this Trojan-style attack to keep your files from becoming permanently inaccessible.

How Botnet Attacks Cause Tons of Damage

Botnet attacks, CybersecurityBy Aaron MattsonJuly 31, 2018Leave a comment

The zombie apocalypse is all too real, but it’s not people who are having their brains overtaken by a cannibalistic disease. In what are known as “botnet attacks,” hordes of computers, smart devices and social media accounts are being stolen and used to conduct large-scale cyber assaults.

How to Prevent Man in the Middle Attacks from Stealing Data

cyber threats, CybersecurityBy Aaron MattsonJune 26, 2018Leave a comment

A man in the middle attack is a type of cyberattack that’s becoming more and more common (see the latest Russian malware incident). Businesses of all sizes should be familiar with what they are, and how to prevent them from causing a cyber security disaster.

3 Potential Flaws of Facial Recognition Technology

CybersecurityBy Aaron MattsonMay 15, 2018Leave a comment

Facial recognition technology is the next aspect of biometric authentication to hit the mainstream. It’s now present on the iPhone X and a few Android phones, and we can expect the vast majority of smartphones to have it over the next few years. As convenient as it may be, it doesn’t come without potential data…

A Brief Guide to PCI Compliance

Cybersecurity, PCI ComplianceBy Aaron MattsonApril 17, 2018Leave a comment

The Payment Card Industry Data Security Standard (PCI DSS) binds all organizations that accept, transmit or store cardholder data. Failure to maintain PCI compliance may result in hefty fines and/or security breaches by hackers. Here are some ways to prevent that from happening.

What is a Zero Day Exploit, and why is it so Dangerous?

Cybersecurity, Zero Day ExploitBy Aaron MattsonMarch 27, 2018Leave a comment

Regardless of how many steps you take to secure your company’s network, it can still be at risk. That’s because of a type of attack known as a zero day exploit. Learn about this dangerous malware and what you can do to defend against it.

How to Avoid Social Engineering Scams

Cybersecurity, Social Engineering ScamsBy Aaron MattsonFebruary 13, 2018Leave a comment

A 2017 Verizon study determined that 43 percent of cyberattacks were social engineering scams. Perhaps one of the scariest things about this type of attack is that firewalls, antiviruses and other software cannot guarantee protection from them.

1
2
…34567…
8
9
© TCI Technologies 2025 | Web Design by Fat Guy Media | Privacy Policy
Go to Top