From The TCS Blog rss

Subscribe to TCS Blog Updates

  • Home
  • From The TCS Blog

From The TCS Blog

Two-Factor Authentication, Keeping You Secure

By: Brayden McMillan

What is two-factor authentication and how can it help your business stay secure? You may not realize it, but you probably use or have used two-factor authentication in the recent past. So, what is it exactly? Two-factor authentication is a method of controlled access that enables a second method of authenticating a user alongside the usual username and password. Google, Twitter, and Apple are typical examples of parties that allow two-factor.

read more >

Phishing for Relief Efforts, Hurricane Harvey & Irma

By: Brayden McMillan

Hurricane Harvey as well as Hurricane Irma have devastated much of Texas, Florida, and the surrounding areas with massive amounts of flooding. Many people are headed to the area to salvage anything possible and rescue anyone stuck in the wake of the recent paths of destruction. Charities, as well as many independent sources, are taking donations to help with the relief effort. These natural disasters have been publicized on almost every major news station across the country because of their.

read more >

How to Stay Connected Using Readily Available Forms of Technology

By: Brayden McMillan

The fall semester of 2017 is here, and students across the globe are headed back to school. Many parents worry about keeping in touch with their children, as many move away from home and begin to adjust to college life. One of the best ways to connect with each other is by using readily available forms of technology. Most teens leaving for college have cell phones, computers and tablets. On each of these devices, many teens and adults alike have social media accounts, which opens a plethora.

read more >

The Insider’s Guide to a Managed Service Provider

By: Barry Utesch

Managed service is a term that gets mentioned a lot in the tech industry. I want to discuss what it is, some of the advantages and disadvantages and why you might be interested in considering it. 

read more >

Five Steps to Achieve a More Secure Mobile Device Policy

By: Brayden McMillan

For the everyday business, one’s employer may not consider the risks associated with issuing a company mobile device. They might even assume that just the passcode or passphrase at the lock screen is enough to prevent unwanted intrusion.

The security of a company mobile device should be just as important as securing a server or workstation. This is because a company issued device is likely to have sensitive information regarding the host company, and possibly client(s) of the host company. 

read more >

Here is What Industry Insiders Say About Security Awareness Training

By: Jessica Clifford

With numerous viral attacks including savvy malware, phishing, and Ransomware scams, it seems necessary that we learn the right skills to navigate our devices like pros. For this reason, security awareness training for employees has become an asset to organizations that are interested in developing a secure and informed workforce.

Many companies that do not test their employees on internet best practices are unaware of the advantages they are missing. There are plenty of reasons to begin .

read more >

Public vs. Private Cloud Computing: What is the Difference?

By: Jessica Clifford

Companies switching to the Cloud may hit a speed bump when they realize they have many unanswered questions. Organizations may ask: What is the Cloud’s security level? Who will manage it? How much money will this cost me in the long run?

read more >

The Major Causes and Solutions for Downtime

By: Jessica Clifford

Downtime is inescapable. However, the top reasons for downtime are mostly IT-related. With issues ranging from Social Engineering to hardware failure, it is nearly impossible for companies to pay equal attention to every cause of downtime.

Fortunately, there are ways to limit the overall amount of downtime your company could endure. Here are the major causes and solutions for downtime:

read more >

How to Detect and Protect Against CEO Fraud

By: Jessica Clifford

The Summer of 2015 was a memorable one for California-based-company, Ubiquiti Networks; though not for a very happy reason. This is when a single reply to a cyber scam lost their company over $40 million. The scam they fell victim to was CEO Fraud, also known as Business Email Compromise (BEC)

read more >

5 Helpful Ways to Avoid Downtime During Tax Season

By: Jessica Clifford

It is the week before taxes are due. Your firm is busy filing data and finishing last minute client needs. Suddenly, no one is able to access the tax preparation software. Someone checks on the server, only to find it has stopped its constant buzzing and the lights are off. You are not sure what this means, but you know that people are unable to do their work. 

With an ever-growing problem, how much will this cost you? Your firm may lose tens of thousands of dollars’ worth of profit. If you.

read more >