Skip to content
(516) 484-5151
FacebookTwitterInstagramGoogle+Linkedin
TCI Technologies
Your Long Island IT Support Company
TCI Technologies
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact

Category Archives: Ransomware

WannaCry Ransomware: What is it, and how do I Stop it?

Cybersecurity, Ransomware, WannaCry RansomwareBy Aaron MattsonMay 17, 2017Leave a comment

The outbreak of the ransomware, known as WannaCry, has quickly become one of the worst cyberattacks in recent memory. On Friday, May 12, 2017, it began infecting thousands upon thousands of computers around the globe, destroying countless files in the process. Here’s everything we know about the WannaCry ransomware attack so far.

The Top 4 Most Terrifying Computer Viruses

computer security, computer virus, Cybersecurity, RansomwareBy Aaron MattsonApril 18, 2017Leave a comment

A while back we wrote a blog that discussed the inception and evolution of computer viruses. We focused on the ones that were the most important in terms of outlining how modern viruses, malware and ransomware were created. This time, we’re going to strictly discuss the world’s most horrifying computer bugs.

Ransomware Attacks now Target Remote Desktop Protocol

Cybersecurity, malware, RansomwareBy Aaron MattsonMarch 30, 2017Leave a comment

Ransomware has gained serious notoriety over the last few years. Bugs like CryptoWall and Locky have claimed countless victims through a variety of tactics, particularly spoof emails. But recently, ransomware attacks have utilized a new point of entry to victims’ computers: Microsoft’s Remote Desktop Protocol.

6 Actionable Ransomware Prevention Tips for Safer Data

Cybersecurity, Ransomware, TCI TipsBy Aaron MattsonAugust 9, 2016Leave a comment

Recently, we wrote a blog defining ransomware and detailing the threat it poses to the cybersecurity of businesses. After learning about it, most people seek out ransomware prevention methods to avoid falling victim to the dreaded form of malware. With these simple tips, you can foil cybercriminals’ plans to hold your data hostage.

What is Ransomware, and Why Should You Care?

Cybersecurity, RansomwareBy Aaron MattsonAugust 2, 2016Leave a comment

Viruses like Locky and CryptoWall are plaguing the Internet. These malicious cyber-infections are known as ransomware. But, what is ransomware, exactly? And, perhaps more importantly, why should you be concerned? In this blog post, TCI explains.

Locky Virus: The Latest Ransomware of 2016

Cybersecurity, malware, RansomwareBy Aaron MattsonJune 7, 2016Leave a comment

While its name sounds kind of silly, the Locky Virus has been one of the most active and dangerous malwares of 2016. One of the latest examples of ransomware, Locky essentially holds your files hostage by encrypting them. It then prompts you to pay Bitcoins to recover your files, similarly to CryptoWall.

12
© TCI Technologies 2026 | Web Design by Fat Guy Media | Privacy Policy
Go to Top