Skip to content
(516) 484-5151
FacebookTwitterInstagramGoogle+Linkedin
TCI Technologies
Your Long Island IT Support Company
TCI Technologies
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact

Category Archives: Cybersecurity

Two Factor Authentication: is an App, Email or SMS Safest?

Cybersecurity, Information Security, Two Factor AuthenticationBy Aaron MattsonOctober 3, 2017Leave a comment

Two factor authentication, also known as 2FA, is absolutely one of the best ways to protect your online accounts from hackers. However, since there are three main authentication methods, many people are left wondering: is it best to use an app, email or SMS message as an authentication factor?

What is Phishing, and is it Dangerous?

Cybersecurity, Phishing, SpoofsBy Aaron MattsonAugust 15, 2017Leave a comment

Of all the common cyberattacks we see, phishing is perhaps the most dangerous because there is no single, foolproof way to prevent it. Rather than ask, “What is phishing?” after you’ve already fallen victim, learn to stay ahead of the hackers.

How Small Businesses can Combat Credit Card Fraud

Business, Credit Cards, Cybersecurity, Fraud, small businessBy Aaron MattsonJuly 25, 2017Leave a comment

Credit card fraud is on the rise, and, unfortunately, small businesses are top targets. No matter the type of product or service your business sells, it’s potentially susceptible to fraud. That’s why it’s important to recognize and avoid today’s common scams.

DDoS Attack Survival Guide: is your Business Prepared?

Cybersecurity, Information SecurityBy Aaron MattsonJuly 11, 2017Leave a comment

Distributed Denial of Service (DDoS) can cripple a business’ internet and technology operations indefinitely. Even scarier, it’s almost impossible to prevent a DDoS attack from taking place. Mitigating their impact is all about response and recovery.

The Complete Security Breach Recovery Guide

Cybersecurity, IT disaster recovery planBy Aaron MattsonJune 6, 2017Leave a comment

No company is too big or too small to stay off the radar of hackers and cybercriminals. So whether you’re experiencing a security breach right now or just preparing for the worst, it’s important to know how to recover quickly.

5 Common Types of Viruses you Should Know About

computer virus, Cybersecurity, Information Security, virus protectionBy Aaron MattsonMay 23, 2017Leave a comment

Computer viruses have been around since shortly after the internet’s inception. While virtually everyone is aware of their existence, few people are familiar with the types of viruses and how they harm the computers they infect.

WannaCry Ransomware: What is it, and how do I Stop it?

Cybersecurity, Ransomware, WannaCry RansomwareBy Aaron MattsonMay 17, 2017Leave a comment

The outbreak of the ransomware, known as WannaCry, has quickly become one of the worst cyberattacks in recent memory. On Friday, May 12, 2017, it began infecting thousands upon thousands of computers around the globe, destroying countless files in the process. Here’s everything we know about the WannaCry ransomware attack so far.

The Top 4 Most Terrifying Computer Viruses

computer security, computer virus, Cybersecurity, RansomwareBy Aaron MattsonApril 18, 2017Leave a comment

A while back we wrote a blog that discussed the inception and evolution of computer viruses. We focused on the ones that were the most important in terms of outlining how modern viruses, malware and ransomware were created. This time, we’re going to strictly discuss the world’s most horrifying computer bugs.

5 Commonly Overlooked Information Security Risks for Businesses

business security, Cybersecurity, Information Security, personal informationBy Aaron MattsonApril 4, 2017Leave a comment

Many businesses are blissfully unaware of the information security risks that plague them. If you’ve never been stressed about the safekeeping of your business’ data, this blog may change that.

Ransomware Attacks now Target Remote Desktop Protocol

Cybersecurity, malware, RansomwareBy Aaron MattsonMarch 30, 2017Leave a comment

Ransomware has gained serious notoriety over the last few years. Bugs like CryptoWall and Locky have claimed countless victims through a variety of tactics, particularly spoof emails. But recently, ransomware attacks have utilized a new point of entry to victims’ computers: Microsoft’s Remote Desktop Protocol.

1
234
…56789
© TCI Technologies 2026 | Web Design by Fat Guy Media | Privacy Policy
Go to Top