The TCS Blog https://blogs.tcsusa.com en-us Wed, 30 Mar 2022 13:55:00 GMT 2022-03-30T13:55:00Z en-us How to Save Money and Optimize Your Office 365 Licensing https://blogs.tcsusa.com/how-to-save-money-and-optimize-your-office-365-licensing <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/how-to-save-money-and-optimize-your-office-365-licensing" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Office%20Space%20%284%29-2.png" alt="How to Save Money and Optimize Your Office 365 Licensing" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>Every company aims to save money. This adds up as an essential aspect, especially when it comes to spending on their software licenses. For example, one of the major software used in businesses is Microsoft Office 365. The cost for basic Microsoft 365 is $6 per user per month, with the premium license going for $22. If your organization has several users, this can be a considerable amount that can significantly impact your IT budget.&nbsp;</span></p> <p><span>So, what should you do to save your Office licensing costs, especially with their price increase?&nbsp;</span></p> <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/how-to-save-money-and-optimize-your-office-365-licensing" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Office%20Space%20%284%29-2.png" alt="How to Save Money and Optimize Your Office 365 Licensing" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>Every company aims to save money. This adds up as an essential aspect, especially when it comes to spending on their software licenses. For example, one of the major software used in businesses is Microsoft Office 365. The cost for basic Microsoft 365 is $6 per user per month, with the premium license going for $22. If your organization has several users, this can be a considerable amount that can significantly impact your IT budget.&nbsp;</span></p> <p><span>So, what should you do to save your Office licensing costs, especially with their price increase?&nbsp;</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=2537784&amp;k=14&amp;r=https%3A%2F%2Fblogs.tcsusa.com%2Fhow-to-save-money-and-optimize-your-office-365-licensing&amp;bu=https%253A%252F%252Fblogs.tcsusa.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> microsoft office microsoft office 365 Wed, 30 Mar 2022 13:55:00 GMT https://blogs.tcsusa.com/how-to-save-money-and-optimize-your-office-365-licensing 2022-03-30T13:55:00Z Total Computer Solutions Total Computer Solutions Receives Recognition by the Best Christian Workplaces Institute https://blogs.tcsusa.com/total-computer-solutions-receives-recognition-by-the-best-christian-workplaces-institute <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/total-computer-solutions-receives-recognition-by-the-best-christian-workplaces-institute" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Sign%203.jpg" alt="Total Computer Solutions Receives Recognition by the Best Christian Workplaces Institute" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><strong></strong></p> <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/total-computer-solutions-receives-recognition-by-the-best-christian-workplaces-institute" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Sign%203.jpg" alt="Total Computer Solutions Receives Recognition by the Best Christian Workplaces Institute" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><strong></strong></p> <img src="https://track.hubspot.com/__ptq.gif?a=2537784&amp;k=14&amp;r=https%3A%2F%2Fblogs.tcsusa.com%2Ftotal-computer-solutions-receives-recognition-by-the-best-christian-workplaces-institute&amp;bu=https%253A%252F%252Fblogs.tcsusa.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> best christian workplaces TCS Wed, 23 Mar 2022 13:55:00 GMT https://blogs.tcsusa.com/total-computer-solutions-receives-recognition-by-the-best-christian-workplaces-institute 2022-03-23T13:55:00Z Ashley Limbers Importance of Security Awareness Training for Employees and C-Suite Executives https://blogs.tcsusa.com/importance-of-security-awareness-training-for-employees-and-c-suite-executives <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/importance-of-security-awareness-training-for-employees-and-c-suite-executives" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Office%20Space%20%284%29.png" alt="Importance of Security Awareness Training for Employees and C-Suite Executives" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>Many organizations continue to lose a lot of money due to data breaches. In addition, a<a href="https://www.privacyaffairs.com/cybersecurity-attacks-in-2021/"> 2021 Cyber Threat Report by SonicWall state, there is a 62% increase in Ransomware since 2019</a></span><span>, and the attacks are expected to increase by 2025.&nbsp;</span></p> <p><span>If you have never experienced cyber threats or attacks, it does not mean that you are safe. It is best to prevent cyber threats before it is too late. The first and most vital element to preventing cyber-attacks is training your employees. Employees are the backbone of your business, and teaching them about cyber security has many benefits for your organization. Read on to learn more about security awareness training.&nbsp;</span></p> <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/importance-of-security-awareness-training-for-employees-and-c-suite-executives" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Office%20Space%20%284%29.png" alt="Importance of Security Awareness Training for Employees and C-Suite Executives" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>Many organizations continue to lose a lot of money due to data breaches. In addition, a<a href="https://www.privacyaffairs.com/cybersecurity-attacks-in-2021/"> 2021 Cyber Threat Report by SonicWall state, there is a 62% increase in Ransomware since 2019</a></span><span>, and the attacks are expected to increase by 2025.&nbsp;</span></p> <p><span>If you have never experienced cyber threats or attacks, it does not mean that you are safe. It is best to prevent cyber threats before it is too late. The first and most vital element to preventing cyber-attacks is training your employees. Employees are the backbone of your business, and teaching them about cyber security has many benefits for your organization. Read on to learn more about security awareness training.&nbsp;</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=2537784&amp;k=14&amp;r=https%3A%2F%2Fblogs.tcsusa.com%2Fimportance-of-security-awareness-training-for-employees-and-c-suite-executives&amp;bu=https%253A%252F%252Fblogs.tcsusa.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security Awareness Training cybersecurity awareness training Wed, 02 Mar 2022 13:33:33 GMT https://blogs.tcsusa.com/importance-of-security-awareness-training-for-employees-and-c-suite-executives 2022-03-02T13:33:33Z Total Computer Solutions Protect Your Loved Ones from Romance Scams https://blogs.tcsusa.com/protect-your-loved-ones-from-romance-scams <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/protect-your-loved-ones-from-romance-scams" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Office%20Space-1.png" alt="Protect Your Loved Ones from Romance Scams" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>When you hear "romance scam," you may think of a little old lady falling for the classic "Nigerian Prince" scam. But romance scams have become far more complex and challenging to recognize, adapting to today's online dating landscape. With the popularity of Match.com, Tinder, and Bumble, scammers have set their sights on these popular apps and even social media.&nbsp;</span></p> <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/protect-your-loved-ones-from-romance-scams" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Office%20Space-1.png" alt="Protect Your Loved Ones from Romance Scams" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>When you hear "romance scam," you may think of a little old lady falling for the classic "Nigerian Prince" scam. But romance scams have become far more complex and challenging to recognize, adapting to today's online dating landscape. With the popularity of Match.com, Tinder, and Bumble, scammers have set their sights on these popular apps and even social media.&nbsp;</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=2537784&amp;k=14&amp;r=https%3A%2F%2Fblogs.tcsusa.com%2Fprotect-your-loved-ones-from-romance-scams&amp;bu=https%253A%252F%252Fblogs.tcsusa.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> romance scams Fri, 11 Feb 2022 14:00:00 GMT https://blogs.tcsusa.com/protect-your-loved-ones-from-romance-scams 2022-02-11T14:00:00Z Total Computer Solutions Data Privacy: How to Take Back Control of Your Data https://blogs.tcsusa.com/data-privacy-how-to-take-back-control-of-your-data <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/data-privacy-how-to-take-back-control-of-your-data" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Untitled%20design%20%2815%29.png" alt="Data Privacy: How to Take Back Control of Your Data" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>From social media to online shopping, our lives and the digital world have become more and more intertwined every day. And while the digital world has afforded us a whole new level of convenience and access to information, consumers must remember the best practices for protecting their data and ensuring it is used the right way.</span><span>&nbsp;</span></p> <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/data-privacy-how-to-take-back-control-of-your-data" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Untitled%20design%20%2815%29.png" alt="Data Privacy: How to Take Back Control of Your Data" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>From social media to online shopping, our lives and the digital world have become more and more intertwined every day. And while the digital world has afforded us a whole new level of convenience and access to information, consumers must remember the best practices for protecting their data and ensuring it is used the right way.</span><span>&nbsp;</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=2537784&amp;k=14&amp;r=https%3A%2F%2Fblogs.tcsusa.com%2Fdata-privacy-how-to-take-back-control-of-your-data&amp;bu=https%253A%252F%252Fblogs.tcsusa.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> data privacy Wed, 26 Jan 2022 14:35:00 GMT https://blogs.tcsusa.com/data-privacy-how-to-take-back-control-of-your-data 2022-01-26T14:35:00Z Total Computer Solutions Top 4 Reasons Why Cloud is More Secure https://blogs.tcsusa.com/top-4-reasons-why-cloud-is-more-secure <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/top-4-reasons-why-cloud-is-more-secure" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Lunch%20%26%20Learn%20Social%20Graphic%20%282%29-1.png" alt="Top 4 Reasons Why Cloud is More Secure" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Cloud computing is quickly becoming ubiquitous in business cycles. And the reason is simple: it offers a reliable and cost-effective IT solution to support the growth and development of businesses.<br><br>Unfortunately, modern-day technology advancements and the rising security threats trigger concerns about the efficiency of security associated with cloud computing.</p> <p>We know that data protection is essential for any business planning to migrate to the cloud. While remotely hosted servers make users vulnerable, the cloud is more secure than on-premise servers.</p> <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/top-4-reasons-why-cloud-is-more-secure" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Lunch%20%26%20Learn%20Social%20Graphic%20%282%29-1.png" alt="Top 4 Reasons Why Cloud is More Secure" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Cloud computing is quickly becoming ubiquitous in business cycles. And the reason is simple: it offers a reliable and cost-effective IT solution to support the growth and development of businesses.<br><br>Unfortunately, modern-day technology advancements and the rising security threats trigger concerns about the efficiency of security associated with cloud computing.</p> <p>We know that data protection is essential for any business planning to migrate to the cloud. While remotely hosted servers make users vulnerable, the cloud is more secure than on-premise servers.</p> <img src="https://track.hubspot.com/__ptq.gif?a=2537784&amp;k=14&amp;r=https%3A%2F%2Fblogs.tcsusa.com%2Ftop-4-reasons-why-cloud-is-more-secure&amp;bu=https%253A%252F%252Fblogs.tcsusa.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> cloud is more secure Wed, 01 Dec 2021 14:02:00 GMT https://blogs.tcsusa.com/top-4-reasons-why-cloud-is-more-secure 2021-12-01T14:02:00Z Total Computer Solutions How Proactive IT Can Help Your Business Reach Its Goals https://blogs.tcsusa.com/how-proactive-it-can-help-your-business-reach-its-goals <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/how-proactive-it-can-help-your-business-reach-its-goals" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Untitled%20%285%20x%203.875%20in%29%20%282%29-1.png" alt="How Proactive IT Can Help Your Business Reach Its Goals" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>IT support comes in many forms, and it is always essential to ensure that your IT support matches your company's needs. However, it is easy to get stuck between reactive and proactive IT when sourcing the best IT support service.&nbsp;</span></p> <p><span>A McAfee report found that the average organization has 14 network device misconfigurations, contributing to 2,269 cyber incidents per month.&nbsp;</span></p> <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/how-proactive-it-can-help-your-business-reach-its-goals" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Untitled%20%285%20x%203.875%20in%29%20%282%29-1.png" alt="How Proactive IT Can Help Your Business Reach Its Goals" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>IT support comes in many forms, and it is always essential to ensure that your IT support matches your company's needs. However, it is easy to get stuck between reactive and proactive IT when sourcing the best IT support service.&nbsp;</span></p> <p><span>A McAfee report found that the average organization has 14 network device misconfigurations, contributing to 2,269 cyber incidents per month.&nbsp;</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=2537784&amp;k=14&amp;r=https%3A%2F%2Fblogs.tcsusa.com%2Fhow-proactive-it-can-help-your-business-reach-its-goals&amp;bu=https%253A%252F%252Fblogs.tcsusa.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> proactive IT Wed, 17 Nov 2021 14:35:00 GMT https://blogs.tcsusa.com/how-proactive-it-can-help-your-business-reach-its-goals 2021-11-17T14:35:00Z Total Computer Solutions 5 Cybersecurity Tools to Protect Your Business https://blogs.tcsusa.com/5-cybersecurity-tools-to-protect-your-business <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/5-cybersecurity-tools-to-protect-your-business" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Office%20Space%20%287%29.png" alt="5 Cybersecurity Tools to Protect Your Business" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>When we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks and breaches, including the <a href="https://www.npr.org/2021/04/16/985439655/a-worst-nightmare-cyberattack-the-untold-story-of-the-solarwinds-hack">SolarWinds</a> and <a href="https://www.zdnet.com/article/kaseya-ransomware-attack-what-we-know-now/">Kaseya breaches</a>, as well as high-profile attacks on the <a href="https://www.cnet.com/tech/services-and-software/colonial-pipeline-ceo-tells-senate-decision-to-pay-hackers-was-made-quickly/">Colonial Pipeline</a> and other critical infrastructure. Furthermore, as has been underlined by these recent breaches, cyberattacks are becoming more sophisticated, with more evolved bad actors cropping up each day. Luckily, there are several steps that we can take daily to mitigate risks and stay one step ahead of malefactors. Here are a few quick tips:</p> <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/5-cybersecurity-tools-to-protect-your-business" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Office%20Space%20%287%29.png" alt="5 Cybersecurity Tools to Protect Your Business" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>When we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks and breaches, including the <a href="https://www.npr.org/2021/04/16/985439655/a-worst-nightmare-cyberattack-the-untold-story-of-the-solarwinds-hack">SolarWinds</a> and <a href="https://www.zdnet.com/article/kaseya-ransomware-attack-what-we-know-now/">Kaseya breaches</a>, as well as high-profile attacks on the <a href="https://www.cnet.com/tech/services-and-software/colonial-pipeline-ceo-tells-senate-decision-to-pay-hackers-was-made-quickly/">Colonial Pipeline</a> and other critical infrastructure. Furthermore, as has been underlined by these recent breaches, cyberattacks are becoming more sophisticated, with more evolved bad actors cropping up each day. Luckily, there are several steps that we can take daily to mitigate risks and stay one step ahead of malefactors. Here are a few quick tips:</p> <img src="https://track.hubspot.com/__ptq.gif?a=2537784&amp;k=14&amp;r=https%3A%2F%2Fblogs.tcsusa.com%2F5-cybersecurity-tools-to-protect-your-business&amp;bu=https%253A%252F%252Fblogs.tcsusa.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> cybersecurity tools Wed, 20 Oct 2021 13:30:00 GMT https://blogs.tcsusa.com/5-cybersecurity-tools-to-protect-your-business 2021-10-20T13:30:00Z Total Computer Solutions 3 Best Practices for Dealing with Phishing Threats https://blogs.tcsusa.com/3-best-practices-for-dealing-with-phishing-threats <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/3-best-practices-for-dealing-with-phishing-threats" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Phishing.png" alt="3 Best Practices for Dealing with Phishing Threats" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;">&nbsp;</p> <p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"><span style="color: #999999;">From ransomware to SolarWinds, the cybersecurity space has been as hectic as it has ever been over the last 12-24 months. However, for all the emerging threats and news that are cropping up on the horizon, phishing -- one of the oldest pain points in cybersecurity -- continues to wreak havoc quietly and is as big of a threat as it has ever been.</span></p> <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/3-best-practices-for-dealing-with-phishing-threats" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/Phishing.png" alt="3 Best Practices for Dealing with Phishing Threats" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;">&nbsp;</p> <p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"><span style="color: #999999;">From ransomware to SolarWinds, the cybersecurity space has been as hectic as it has ever been over the last 12-24 months. However, for all the emerging threats and news that are cropping up on the horizon, phishing -- one of the oldest pain points in cybersecurity -- continues to wreak havoc quietly and is as big of a threat as it has ever been.</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=2537784&amp;k=14&amp;r=https%3A%2F%2Fblogs.tcsusa.com%2F3-best-practices-for-dealing-with-phishing-threats&amp;bu=https%253A%252F%252Fblogs.tcsusa.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> phishing threats Wed, 29 Sep 2021 13:33:00 GMT https://blogs.tcsusa.com/3-best-practices-for-dealing-with-phishing-threats 2021-09-29T13:33:00Z Total Computer Solutions Total Computer Solutions Presents 5th Annual Cybersecurity Panel https://blogs.tcsusa.com/total-computer-solutions-presents-5th-annual-cybersecurity-panel <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/total-computer-solutions-presents-5th-annual-cybersecurity-panel" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/5th%20Annual%20Cybersecurity%20Panel%20Discussion-1.png" alt="Total Computer Solutions Presents 5th Annual Cybersecurity Panel" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"><strong></strong></p> <p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;">&nbsp;</p> <p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"><strong>Greensboro, N.C.—September 27, 2021 –&nbsp;</strong><em>Managed IT leader, Total Computer Solutions, together with FBI Agent, Adam Scholtz, will hold their “5th Annual Cybersecurity Panel Discussion” to address business concerns related to data security on October 7, 2021.&nbsp;</em></p> <p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"><em></em></p> <div class="hs-featured-image-wrapper"> <a href="https://blogs.tcsusa.com/total-computer-solutions-presents-5th-annual-cybersecurity-panel" title="" class="hs-featured-image-link"> <img src="https://blogs.tcsusa.com/hubfs/5th%20Annual%20Cybersecurity%20Panel%20Discussion-1.png" alt="Total Computer Solutions Presents 5th Annual Cybersecurity Panel" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"><strong></strong></p> <p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;">&nbsp;</p> <p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"><strong>Greensboro, N.C.—September 27, 2021 –&nbsp;</strong><em>Managed IT leader, Total Computer Solutions, together with FBI Agent, Adam Scholtz, will hold their “5th Annual Cybersecurity Panel Discussion” to address business concerns related to data security on October 7, 2021.&nbsp;</em></p> <p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"><em></em></p> <img src="https://track.hubspot.com/__ptq.gif?a=2537784&amp;k=14&amp;r=https%3A%2F%2Fblogs.tcsusa.com%2Ftotal-computer-solutions-presents-5th-annual-cybersecurity-panel&amp;bu=https%253A%252F%252Fblogs.tcsusa.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> cybersecurity panel discussion Wed, 22 Sep 2021 18:52:00 GMT https://blogs.tcsusa.com/total-computer-solutions-presents-5th-annual-cybersecurity-panel 2021-09-22T18:52:00Z Ashley Limbers