Skip to content
(516) 484-5151
FacebookTwitterInstagramGoogle+Linkedin
TCI Technologies
Your Long Island IT Support Company
TCI Technologies
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact

Category Archives: Ransomware

cyber criminal looking out over a city

Suffolk County, N.Y. Ransomware Attack Shuts Down System Operations

Cyber Attacks, Cybersecurity, RansomwareBy Bryan RiedelSeptember 12, 2022

Suffolk County’s computer systems were the latest victims of cyber attacks that are becoming increasingly common among local governments and private businesses. On September 8th, 2022, Suffolk County information technology officials noticed unusual computer coding and alerted the county to take down its systems.

Should You Pay Ransomware?

cyber security, RansomwareBy Aaron MattsonOctober 17, 2019Leave a comment

Ransomware is one of the scariest cyberattacks to deal with. Typically, a big, alarming message pops up on your computer, alerting you that all of your files have been locked and will be permanently deleted unless you pay a ransom. In this blog, we’ll discuss whether or not to pay ransomware.

Orange County Ransomware Attack Delayed Start of School Year

cyber security, RansomwareBy Aaron MattsonSeptember 4, 2019Leave a comment

The Monroe-Woodbury Central School District of Central Valley, New York emailed parents on Tuesday, announcing that the school year would start a day late, on Thursday, September 5, thanks to a ransomware attack.

Ransomware Attack is Holding the City of Baltimore Hostage

RansomwareBy Aaron MattsonMay 23, 2019Leave a comment

During the last two weeks, the City of Baltimore has had all of its computer data encrypted due to an anonymous ransomware attack. Since the breach, email systems are offline, payments to city departments can’t be made online and real estate transactions cannot be processed. Despite the disruptions, the city has refused to pay the…

New Ransomware Relies on PayPal Phishing

cyber security, Phishing, RansomwareBy Aaron MattsonFebruary 5, 2019Leave a comment

An unfortunately clever new form of ransomware uses a PayPal phishing page in an attempt to steal your credit card information. Learn about this cyberattack to recognize it and avoid being scammed by it.

What You Need to know about KeyPass Ransomware

cyber security threats, Cybersecurity, RansomwareBy Aaron MattsonSeptember 4, 2018Leave a comment

KeyPass ransomware is a global cyberattack that has been gaining more and more traction over the few months. Understand how to identify and prevent this Trojan-style attack to keep your files from becoming permanently inaccessible.

How to Avoid Ransomware Attacks in 2018

Cybersecurity, Information Security, RansomwareBy Aaron MattsonJanuary 9, 2018Leave a comment

The frequency of ransomware attacks exploded between 2016 and 2017, and there’s no sign that they’re just going to disappear any time soon. Quite the opposite, actually: hackers are designing even more complex attacks that are harder to identify and remove. Use this information to understand how they work and avoid them.

WannaCry Ransomware: What is it, and how do I Stop it?

Cybersecurity, Ransomware, WannaCry RansomwareBy Aaron MattsonMay 17, 2017Leave a comment

The outbreak of the ransomware, known as WannaCry, has quickly become one of the worst cyberattacks in recent memory. On Friday, May 12, 2017, it began infecting thousands upon thousands of computers around the globe, destroying countless files in the process. Here’s everything we know about the WannaCry ransomware attack so far.

The Top 4 Most Terrifying Computer Viruses

computer security, computer virus, Cybersecurity, RansomwareBy Aaron MattsonApril 18, 2017Leave a comment

A while back we wrote a blog that discussed the inception and evolution of computer viruses. We focused on the ones that were the most important in terms of outlining how modern viruses, malware and ransomware were created. This time, we’re going to strictly discuss the world’s most horrifying computer bugs.

Ransomware Attacks now Target Remote Desktop Protocol

Cybersecurity, malware, RansomwareBy Aaron MattsonMarch 30, 2017Leave a comment

Ransomware has gained serious notoriety over the last few years. Bugs like CryptoWall and Locky have claimed countless victims through a variety of tactics, particularly spoof emails. But recently, ransomware attacks have utilized a new point of entry to victims’ computers: Microsoft’s Remote Desktop Protocol.

12
© TCI Technologies 2023 | Web Design by Fat Guy Media | Privacy Policy
Go to Top