Skip to content
(516) 484-5151
Facebook page opens in new windowX page opens in new windowInstagram page opens in new windowLinkedin page opens in new window
TCI Technologies
Your Long Island IT Support Company
TCI Technologies
  • About
    • Commitment to the Community
    • Technology Partners
  • Industries
    • Construction Companies
    • Non-Profits
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VoIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Asset Discovery
    • Behavior Monitoring
    • Disaster Recovery & Data Protection
    • Email Security
    • Intrusion Prevention System (IPS)
    • Penetration Testing
    • Vulnerability Scans
  • Blog
  • Careers
  • Contact
  • About
    • Commitment to the Community
    • Technology Partners
  • Industries
    • Construction Companies
    • Non-Profits
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VoIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Asset Discovery
    • Behavior Monitoring
    • Disaster Recovery & Data Protection
    • Email Security
    • Intrusion Prevention System (IPS)
    • Penetration Testing
    • Vulnerability Scans
  • Blog
  • Careers
  • Contact

Category Archives: cyber security

Fileless Malware Attacks: What are They, and How Do You Stop Them?

cyber security, cyber security threats, cyber threats, malware, malware defenseBy Aaron MattsonApril 30, 2019Leave a comment

Traditional, run-of-the-mill malware usually makes its way onto a victim’s computer via the download of an infected file. However, that’s not always the case. Fileless malware attacks use tools that are already on your computer to carry out attacks. Here’s what you need to know.

New Ransomware Relies on PayPal Phishing

cyber security, Phishing, RansomwareBy Aaron MattsonFebruary 5, 2019Leave a comment

An unfortunately clever new form of ransomware uses a PayPal phishing page in an attempt to steal your credit card information. Learn about this cyberattack to recognize it and avoid being scammed by it.

What You Need to Know about Latest DocuSign Scam Email

cyber security, SpoofsBy Aaron MattsonJanuary 10, 2019Leave a comment

Hackers have done a pretty good job at impersonating DocuSign, a leading electronic signature company that many businesses rely on. Learn how to recognize and fight a recent DocuSign scam email that has already claimed thousands of victims.

What is Sandboxing Software, and why is it Important for Cyber Security?

cyber securityBy Aaron MattsonSeptember 25, 2018Leave a comment

When it comes to keeping your business protected, a holistic, integrative approach to cyber security works best. This should include sandboxing software that quarantines and analyzes threats.

How to Create a Strong Password in 2019

cyber security, password management, password protectionBy Aaron MattsonAugust 21, 2018Leave a comment

A strong password is crucial to preventing hackers from stealing personal and business data. Use these rules to improve your password strength and keep hackers away.

Why You Need to Watch for Spear Phishing Attacks

cyber security, PhishingBy Aaron MattsonAugust 7, 2018Leave a comment

Phishing is a dangerous cyberattack that seeks to prey on unsuspecting victims. Spear phishing attacks are even scarier and more dangerous. Learn how to identify and prevent them from compromising your sensitive data.

Why New Technology isn’t Always More Secure

Awesome new technology, cyber securityBy Aaron MattsonJuly 11, 2018Leave a comment

You’d be hard-pressed to find someone who doesn’t view innovation as a good thing, and we’re no different. However, it’s important to understand that with new technology comes new cyber security threats. Here’s why, and what you can do to stay ahead of the hackers.

HIPAA Compliance: A Basic Summary

cyber security, HIPAA ComplianceBy Aaron MattsonApril 3, 2018Leave a comment

The Health Insurance Portability and Accountability Act (HIPAA) mandates that health care organizations protect the privacy of patients’ personal information. Maintaining HIPAA compliance requires several key cyber security measures.

What are Vulnerability Scans and Penetration Testing?

cyber security, Penetration TestingBy Aaron MattsonMarch 14, 2018Leave a comment

The security of your company’s network is not something that should be taken lightly. You may know by now that small, local businesses are no safer from hackers than large businesses. Cyber security practices like penetration testing and vulnerability scans can help keep your network safe.

5 Subtle Signs You’ve Fallen Victim to a Data Breach

computer security, cyber security, Data BreachBy Aaron MattsonMarch 14, 2017Leave a comment

There’s a good chance you’re aware of how terrifyingly clever cybercriminals have become in the last few years. Unfortunately, they’re great at their jobs, meaning it’s possible for them to conduct a successful data breach of your business without you even realizing.

←12345→
© TCI Technologies 2026 | Web Design by Fat Guy Media | Privacy Policy
Go to Top