Skip to content
(516) 484-5151
Facebook page opens in new windowX page opens in new windowInstagram page opens in new windowLinkedin page opens in new window
TCI Technologies
Your Long Island IT Support Company
TCI Technologies
  • About
    • Commitment to the Community
    • Technology Partners
  • Industries
    • Construction Companies
    • Non-Profits
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VoIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Asset Discovery
    • Behavior Monitoring
    • Disaster Recovery & Data Protection
    • Email Security
    • Intrusion Prevention System (IPS)
    • Penetration Testing
    • Vulnerability Scans
  • Blog
  • Careers
  • Contact
  • About
    • Commitment to the Community
    • Technology Partners
  • Industries
    • Construction Companies
    • Non-Profits
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VoIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Asset Discovery
    • Behavior Monitoring
    • Disaster Recovery & Data Protection
    • Email Security
    • Intrusion Prevention System (IPS)
    • Penetration Testing
    • Vulnerability Scans
  • Blog
  • Careers
  • Contact

Category Archives: Cybersecurity

The Complete Security Breach Recovery Guide

Cybersecurity, IT disaster recovery planBy Aaron MattsonJune 6, 2017Leave a comment

No company is too big or too small to stay off the radar of hackers and cybercriminals. So whether you’re experiencing a security breach right now or just preparing for the worst, it’s important to know how to recover quickly.

5 Common Types of Viruses you Should Know About

computer virus, Cybersecurity, Information Security, virus protectionBy Aaron MattsonMay 23, 2017Leave a comment

Computer viruses have been around since shortly after the internet’s inception. While virtually everyone is aware of their existence, few people are familiar with the types of viruses and how they harm the computers they infect.

WannaCry Ransomware: What is it, and how do I Stop it?

Cybersecurity, Ransomware, WannaCry RansomwareBy Aaron MattsonMay 18, 2017Leave a comment

The outbreak of the ransomware, known as WannaCry, has quickly become one of the worst cyberattacks in recent memory. On Friday, May 12, 2017, it began infecting thousands upon thousands of computers around the globe, destroying countless files in the process. Here’s everything we know about the WannaCry ransomware attack so far.

The Top 4 Most Terrifying Computer Viruses

computer security, computer virus, Cybersecurity, RansomwareBy Aaron MattsonApril 18, 2017Leave a comment

A while back we wrote a blog that discussed the inception and evolution of computer viruses. We focused on the ones that were the most important in terms of outlining how modern viruses, malware and ransomware were created. This time, we’re going to strictly discuss the world’s most horrifying computer bugs.

5 Commonly Overlooked Information Security Risks for Businesses

business security, Cybersecurity, Information Security, personal informationBy Aaron MattsonApril 4, 2017Leave a comment

Many businesses are blissfully unaware of the information security risks that plague them. If you’ve never been stressed about the safekeeping of your business’ data, this blog may change that.

Ransomware Attacks now Target Remote Desktop Protocol

Cybersecurity, malware, RansomwareBy Aaron MattsonMarch 30, 2017Leave a comment

Ransomware has gained serious notoriety over the last few years. Bugs like CryptoWall and Locky have claimed countless victims through a variety of tactics, particularly spoof emails. But recently, ransomware attacks have utilized a new point of entry to victims’ computers: Microsoft’s Remote Desktop Protocol.

The 5 Wildest Computer Hacking Cases of All Time

Cybersecurity, Hacking CasesBy Aaron MattsonMarch 28, 2017Leave a comment

Time and time again, we see high-profile hacking cases popping up in the media. Cybersecurity is clearly an issue for businesses of all shapes and sizes, as well as individuals. In this blog, we’ll take a look back at some of the most controversial examples of hacking that have ever happened.

What is the Internet of Things and why is it a Security Threat?

Cybersecurity, Internet of ThingsBy Aaron MattsonFebruary 7, 2017Leave a comment

As more and more devices are capable of being connected to cyberspace, the Internet of Things will continue to expand. That could be good or bad, depending on how you look at it. In this blog post, we’ll focus on the security liabilities that come with increased connectedness.

4 Steps to Sending a Secure Email

Cybersecurity, email, email tips, securityBy Aaron MattsonJanuary 24, 2017Leave a comment

As a businessperson, a hacked email can have devastating results. At best, the hacker sends a few spam emails to your contacts, tarnishing your reputation. At worst, sensitive information falls into the wrong hands. With the increasing number of hacking cases, knowing how to send a secure email is more important than ever.

How to Secure your Google Account

Cybersecurity, Google AccountBy Aaron MattsonDecember 21, 2016Leave a comment

There’s a good chance that your Google account houses tons of valuable personal information. If you use Gmail as your email client, Chrome for browsing the web or have an Android phone, you’re using Google a whole lot more than you may realize. That said, you’ll want your account to be as secure as possible.

←1
234
…56789→
© TCI Technologies 2026 | Web Design by Fat Guy Media | Privacy Policy
Go to Top