From The TCS Blog rss

Subscribe to TCS Blog Updates

TCS-Website-InteriorHeader-ComputerGuy.png
  • Home
  • From The TCS Blog

From The TCS Blog

Public vs. Private Cloud Computing: What is the Difference?

By: Jessica Clifford

Companies switching to the Cloud may hit a speed bump when they realize they have many unanswered questions. Organizations may ask: What is the Cloud’s security level? Who will manage it? How much money will this cost me in the long run?

read more >

The Major Causes and Solutions for Downtime

By: Jessica Clifford

Downtime is inescapable. However, the top reasons for downtime are mostly IT-related. With issues ranging from Social Engineering to hardware failure, it is nearly impossible for companies to pay equal attention to every cause of downtime.

Fortunately, there are ways to limit the overall amount of downtime your company could endure. Here are the major causes and solutions for downtime:

read more >

How to Detect and Protect Against CEO Fraud

By: Jessica Clifford

The Summer of 2015 was a memorable one for California-based-company, Ubiquiti Networks; though not for a very happy reason. This is when a single reply to a cyber scam lost their company over $40 million. The scam they fell victim to was CEO Fraud, also known as Business Email Compromise (BEC)

read more >

5 Helpful Ways to Avoid Downtime During Tax Season

By: Jessica Clifford

It is the week before taxes are due. Your firm is busy filing data and finishing last minute client needs. Suddenly, no one is able to access the tax preparation software. Someone checks on the server, only to find it has stopped its constant buzzing and the lights are off. You are not sure what this means, but you know that people are unable to do their work. 

With an ever-growing problem, how much will this cost you? Your firm may lose tens of thousands of dollars’ worth of profit. If you.

read more >

What WAN and VPN Mean in Computer Terms

By: Barry Utesch

 

 

You may have heard of these terms, but are unsure what WAN and VPN mean. Wide area networking is technology that companies use when they need to connect locations that are geographically separated. Typically, the purpose of this connection is to share data or voice traffic between locations. The separation between sites could be a short distance across a busy road or railroad tracks or it could be in another country. The two main requirements are; 1-the inability to lay a fiber or.

read more >

The Top USB Security Practices

By: Jessica Clifford

Does your company view USB drives as suitable devices in the workplace, while overlooking their safety hazards? Though flash drives are inexpensive and small tools, they are easy to misuse. The major issue is that employees treat flash drives as disposable and replaceable work tools even though they are just as important as a cell phone or a laptop.

read more >

The Top Facts about Ransomware Scams

By: Jessica Clifford

Ransomware has encrypted your computer at work. You know your company is going to pay the ransom to decrypt your files because they do not back up your data. However, now you are questioning whether the hacker can come back and infect your computer again.

Double ransom is a common point of interest for many who have fallen victim to a Ransomware scam. The company might feel safe after they were hacked once, believing the hacker cannot come back and ransom them twice. However, that is.

read more >

The ABA's Cybersecurity Tip for Lawyers

By: Jessica Clifford

You just opened a mass phishing email, creating downtime because you now need to run a security check. What does this mean? It is simple; your law firm might be losing money because they are unprepared for this attack.

Now, think if you had cyber insurance keeping you afloat during this crisis. Your insurer would reimburse you for the extortion fees and the data loss. Sounds unimportant to you if you have not fallen victim yet, but one in forty small businesses are at risk of being a.

read more >

4 Inexpensive Security Tips for Law Firms

By: Jessica Clifford

It’s Monday morning; you are still a little tired from your busy weekend. Now you are sitting at your desk, opening emails as usual. Open, read, click the attachment, skim, and reply. Your routine is mundane, always the same. Except for today.

Today, you see an email written by your friend, who is also another attorney in the office. The friend says there is a woman needing help with a worker’s compensation case. You, who specifically works with worker’s compensation cases, opens the email.

read more >

Clicked on a Malicious Link? Read This!

By: Jessica Clifford

It is a Friday night; you are exhausted from the work week. The bed is calling your name, but you are on your laptop, opening up emails from family, friends, and your favorite store alerting you about its sale for the weekend. All of a sudden you get a new email.

You rub your itchy, half-shut eyes, and open the email out of curiosity. Supposedly your bank is asking you to change your account’s password. You click on the attached link, unaware that the bank is not even the one you use.

read more >