Skip to content
(516) 484-5151
FacebookTwitterInstagramGoogle+Linkedin
TCI Technologies
Your Long Island IT Support Company
TCI Technologies
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact

Category Archives: malware

What is Vishing, and How can you Prevent an Attack?

Cybersecurity, malware, PhishingBy Aaron MattsonSeptember 10, 2020Leave a comment

With the almost universal introduction of caller ID, choosing who and when to answer calls has become a tad bit easier. However, unfortunately, people still fall victim to vishing attacks. But what is vishing exactly? In this blog, we will explore this newfangled type of phishing while laying out some helpful ways to avoid becoming…

Windows Vulnerability: How Safe is the Average PC Machine?

Cybersecurity, malware, microsoft, Windows 10By Aaron MattsonMay 14, 2020Leave a comment

After the much-hyped rollout of Windows 10, there were bound to be some hiccups along the way. Well, they’ve arrived in the form of a very specific type of malware attack. Although there’s no telling how widespread the issue may be, this Windows vulnerability is affecting many users. That’s why we decided to dig a…

Why Mac Malware is More Prevalent than You’d Think

apple, cyber security, malwareBy Aaron MattsonApril 23, 2020Leave a comment

For a long time, people looked at Macs as the safer alternative to Windows. And for a while, that was true. However, in recent months, there’s been an uptick in malware attacks on Mac computers. With Mac malware on the rise, we look at what’s going on, as well as how we got here.

Nodersok Malware Turning Windows PCs into ‘Zombies’

cyber security, malware, malware defenseBy Aaron MattsonOctober 3, 2019Leave a comment

Microsoft recently discovered a new strain of fileless malware that essentially hijacks PCs and turns them into hubs for carrying out further malicious activity. Here’s what we know about Nodersok malware so far.

Fileless Malware Attacks: What are They, and How Do You Stop Them?

cyber security, cyber security threats, cyber threats, malware, malware defenseBy Aaron MattsonApril 30, 2019Leave a comment

Traditional, run-of-the-mill malware usually makes its way onto a victim’s computer via the download of an infected file. However, that’s not always the case. Fileless malware attacks use tools that are already on your computer to carry out attacks. Here’s what you need to know.

Ransomware Attacks now Target Remote Desktop Protocol

Cybersecurity, malware, RansomwareBy Aaron MattsonMarch 30, 2017Leave a comment

Ransomware has gained serious notoriety over the last few years. Bugs like CryptoWall and Locky have claimed countless victims through a variety of tactics, particularly spoof emails. But recently, ransomware attacks have utilized a new point of entry to victims’ computers: Microsoft’s Remote Desktop Protocol.

Locky Virus: The Latest Ransomware of 2016

Cybersecurity, malware, RansomwareBy Aaron MattsonJune 7, 2016Leave a comment

While its name sounds kind of silly, the Locky Virus has been one of the most active and dangerous malwares of 2016. One of the latest examples of ransomware, Locky essentially holds your files hostage by encrypting them. It then prompts you to pay Bitcoins to recover your files, similarly to CryptoWall.

What is Malware, and how can I Avoid it?

computer virus, IT support, malware, what is malwareBy Aaron MattsonFebruary 10, 2016Leave a comment

Whether they know it or not, any person who has used a computer has been confronted with malware. But what is malware, anyway, and how can it be prevented from infecting a computer?

© TCI Technologies 2023 | Web Design by Fat Guy Media | Privacy Policy
Go to Top