Skip to content
(516) 484-5151
Facebook page opens in new windowX page opens in new windowInstagram page opens in new windowLinkedin page opens in new window
TCI Technologies
Your Long Island IT Support Company
TCI Technologies
  • About
    • Commitment to the Community
    • Technology Partners
  • Industries
    • Construction Companies
    • Non-Profits
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VoIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Asset Discovery
    • Behavior Monitoring
    • Disaster Recovery & Data Protection
    • Email Security
    • Intrusion Prevention System (IPS)
    • Penetration Testing
    • Vulnerability Scans
  • Blog
  • Careers
  • Contact
  • About
    • Commitment to the Community
    • Technology Partners
  • Industries
    • Construction Companies
    • Non-Profits
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VoIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Asset Discovery
    • Behavior Monitoring
    • Disaster Recovery & Data Protection
    • Email Security
    • Intrusion Prevention System (IPS)
    • Penetration Testing
    • Vulnerability Scans
  • Blog
  • Careers
  • Contact

Category Archives: Cybersecurity

United States Could Appoint Cyber Security Leaders for Each State

CybersecurityBy Aaron MattsonFebruary 28, 2020Leave a comment

I n January 2020, a bipartisan group of United States senators introduced legislation that would require the Department of Homeland Security to select cyber security leaders for each state. This legislation comes in the face of growing cyber threats to local, state and national governments.

7 of the Worst Data Breaches and Cyberattacks of 2019

Cyber Attacks, cyber security, cyber threats, Cybersecurity, Data BreachBy Aaron MattsonDecember 26, 2019Leave a comment

With the year coming to an end, it’s time to reflect upon the worst data breaches and cyberattacks of 2019. From theft of medical data to corporate account credentials, here they are (in no particular order).

4 Dangerous Router Attacks to Watch Out For

Cybersecurity, Router, Wireless InternetBy Aaron MattsonJuly 12, 2019Leave a comment

In the age of ransomware attacks and other data breaches, securing your network is more important than ever—and that includes Wi-Fi. Watch out for these common router attacks that can put a company offline relatively easily.

What is Endpoint Security, and Why Is It Important?

Cybersecurity, Endpoint SecurityBy Aaron MattsonJuly 4, 2019Leave a comment

With more and more employees using devices to connect to the company network remotely, endpoint security has become increasingly important. Read along to understand what it is, and why it’s vital for companies of all sizes to invest in it.

7 Key Reasons to Use a Password Manager

CybersecurityBy Aaron MattsonJune 27, 2019Leave a comment

It’s a good practice to use a complex, unique password for every account you have. The problem is, it’s nearly impossible to remember so many different login credentials. The solution is using a password manager to store all of them.

How Not to Fall Victim to Voice Phishing Attacks

Cybersecurity, PhishingBy Aaron MattsonJune 20, 2019Leave a comment

Voice phishing attacks are similar to phishing attacks—they trick you into giving sensitive information to criminals. However, most phishing attacks are carried out using the internet. Voice phishing scams are done over the phone. Here’s what to look out for.

What is an Incident Response Plan, and What Does it Consist Of?

Cybersecurity, Incident Response PlanBy Aaron MattsonJune 6, 2019Leave a comment

No organization is truly safe from cyberattacks. Even the most comprehensive cyber security strategies with state-of-the-art software falter from time to time. An incident response plan is necessary for those occasions.

Why Health Care Cyber Security Threats are Among the Most Dangerous

cyber security threats, Cybersecurity, Health CareBy Aaron MattsonMay 14, 2019Leave a comment

The health care industry has evolved for the better thanks to the latest technology that streamlines everything from clerical tasks to patient care. However, along with new technology comes new risks. Health care cyber security threats are real and are evolving at a terrifying pace.

Why You Need to Stop Ignoring Software Update Popups

Cybersecurity, Software UpdateBy Aaron MattsonApril 17, 2019Leave a comment

As tempting as it might be to simply close out of those annoying software update popups that seem to appear every few minutes, there are a few reasons you shouldn’t. Whether these popups are coming up on your phone, your tablet or your desktop, here’s why you shouldn’t ignore them.

5 of the Most Common, yet Dangerous, Types of Spoof Emails

Cybersecurity, email tipsBy Aaron MattsonDecember 5, 2018Leave a comment

Most people understand that cyberattacks are often conducted via email. However, few actually know how to successfully recognize common types of spoof emails. In this blog, we’ll break down a couple of examples.

←123456…
78
9→
© TCI Technologies 2026 | Web Design by Fat Guy Media | Privacy Policy
Go to Top