Skip to content
(516) 484-5151
FacebookTwitterInstagramGoogle+Linkedin
TCI Technologies
Your Long Island IT Support Company
TCI Technologies
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact

Category Archives: Cybersecurity

What is Two Factor Authentication?

Cybersecurity, securityBy Aaron MattsonSeptember 6, 2016Leave a comment

Despite its techy-sounding name, two factor authentication is one of the simplest ways to keep your information secure online. But what is two factor authentication, exactly?

The History of Computer Viruses: a Quick Lesson

computer virus, CybersecurityBy Aaron MattsonAugust 23, 2016Leave a comment

Computer viruses didn’t just manifest through natural means like biological bugs. They’re manmade, of course. But where and why did they start? This lesson on the history of computer viruses will help you understand their origin and evolution.

Should I Encrypt my Phone? If So, How do I do it?

Cybersecurity, Mobile securityBy Aaron MattsonAugust 16, 2016Leave a comment

For some reason, many people are under the impression that their smartphones are invulnerable to cyberattacks. That’s a dangerous assumption, especially with the increasing threat of ransomware. To anyone who’s asked the question “should I encrypt my phone?” the answer is yes.

6 Actionable Ransomware Prevention Tips for Safer Data

Cybersecurity, Ransomware, TCI TipsBy Aaron MattsonAugust 9, 2016Leave a comment

Recently, we wrote a blog defining ransomware and detailing the threat it poses to the cybersecurity of businesses. After learning about it, most people seek out ransomware prevention methods to avoid falling victim to the dreaded form of malware. With these simple tips, you can foil cybercriminals’ plans to hold your data hostage.

What is Ransomware, and Why Should You Care?

Cybersecurity, RansomwareBy Aaron MattsonAugust 2, 2016Leave a comment

Viruses like Locky and CryptoWall are plaguing the Internet. These malicious cyber-infections are known as ransomware. But, what is ransomware, exactly? And, perhaps more importantly, why should you be concerned? In this blog post, TCI explains.

4 Data Breach Protection Tips for Small Business Owners

business security, Cybersecurity, small business, TCI TipsBy Aaron MattsonJune 28, 2016Leave a comment

As the frequency of malicious software attacks increases, so too does the importance of maintaining strong cybersecurity policies. For most small businesses, a data breach signals disaster. But, if your business’ sensitive information is effectively fortified, you can steer clear of catastrophe.

Locky Virus: The Latest Ransomware of 2016

Cybersecurity, malware, RansomwareBy Aaron MattsonJune 7, 2016Leave a comment

While its name sounds kind of silly, the Locky Virus has been one of the most active and dangerous malwares of 2016. One of the latest examples of ransomware, Locky essentially holds your files hostage by encrypting them. It then prompts you to pay Bitcoins to recover your files, similarly to CryptoWall.

1
234
…56789
© TCI Technologies 2026 | Web Design by Fat Guy Media | Privacy Policy
Go to Top