From The TCS Blog rss

Subscribe to TCS Blog Updates

  • Home
  • From The TCS Blog

From The TCS Blog

10 Ways to Secure Your Microsoft 365 Business Account

By: Total Computer Solutions

Securing a Microsoft 365 account requires careful attention. While Microsoft offers excellent ways to securing workstations and servers, it is ultimately up to you to put this in play.

One place to start is to check your Microsoft 365 Secure Score to identify areas that need improvement. Also, Microsoft recommends the following ten steps for improving 365 security. Some of these steps require Office 365 Advanced Threat Protection (ATP). 

read more >

What Wi-Fi 6 Means for Your Organization

By: Total Computer Solutions

2020 is the year when Wi-Fi 6 becomes mainstream. It comes with better performance and security than ever for wireless devices. If you are running a business, you need an adoption strategy. Do you want to be an early adopter, upgrading as quickly as possible? Are you going to hang onto the old technology as long as you can? Or is the best approach somewhere in the middle, adding updated equipment in the course of regular replacements?

The best answer depends on your business's needs and how.

read more >

The New & Improved TCS Website

By: Total Computer Solutions

We are excited to finally unveil a more enhanced and functional website that will work better for you. We set out on this project to make the TCS website faster, easier-to-use, and accessible across most devices. 

read more >

Legacy Wireless Support in a Modern Infrastructure

By: Total Computer Solutions

You want to keep your Wi-Fi infrastructure up to date, so you can get the fastest and most reliable performance. But what about older devices? Will they stop working or drag down your network? They do not have to. The main compatibility issue is with speed, frequency bands, and protocols. 

read more >

5 Tips for Maximum Productivity When Working Remote

By: Total Computer Solutions

Waking up to drive to the office every weekday is a norm for most individuals, and being in such an environment helps them achieve specific goals. But what happens when, for some reason, you have to work from home? Will you still be as productive as you are in your office environment? 

Working from home has its fair share of challenges, which can affect your productivity. Here are some tips on how you can remain productive while working from home.

read more >

Improving Office Communication with Microsoft Teams

By: Total Computer Solutions

Remote communication and collaboration are increasingly important in business. With many people working from home or unable to travel, online connections take the place of in-person meetings. Users of Office 365 have a resource which they may not even know about. The resource is Microsoft Teams, which is included in Office 365.

read more >

5 Cybersecurity Trends You Should Know for 2020

By: Total Computer Solutions

From smartphones to the electrical grid to interference by foreign countries in elections, cybersecurity is on everyone’s mind these days. Since you are reading this, you are likely looking to understand cybersecurity trends in 2020. Here are serveral examples that might aid you on your way.

read more >

Security Advice After the Malware Attack on the City of Durham

By: Total Computer Solutions

In today's digital world, it is not if malware will attack your network, but when. Case in point: the Durham City and County government malware attacked during the weekend of March 6, 2020. The city and county network was infiltrated by Ryuk ransomware. It is important to understand how to prevent malware attacks.

read more >

The Best Guide to Creating Secure Passwords

By: Total Computer Solutions

We all use passwords every day to help protect our banking records, health data, and personal information. Creating a strong password is our first line of defense against cyber-attacks. The National Institute of Standards and Technology (NIST) has adapted to many changes since its start in 1901. This government association exists to help ensure compliance and standards surrounding technological use. NIST is responsible for updating a policy for password creation. The policy is only a.

read more >

Detailed Guide for Ransomware Attack Recovery

By: Total Computer Solutions

Over the past few years, ransomware attacks have grown in complexity. What started as single-hacker assaults turned into a business. Today, hackers set up virtual offices with help desks, toll-free numbers, and much more. What can an organization do to protect itself?

Proper preparations, coupled with quick reactions, can help you avoid an attack or, at least, minimize serious consequences. This short guide can give you a general idea of how to proceed. 

read more >