TCS Data-bits
January 2016   
    In this issue. . .
- 10 low-cost ways to market your business
- Innovations you'll be using next year
- Why Smartphones and Tablets Need Security Software
- Spotting the signs of a B2B scam
- Operating in the fourth industrial revolution
- Business Continuity Tip
- Quote & Cartoon
   Follow Us:             

Let TCS Help You With Your IT Needs

Phishing Attack

Business Continuity Tip
Prepare for Flu Season

Flu season can have a big impact on a business. Every year, 5-20% of the population becomes infected, resulting in nearly $16 billion in lost earnings, according to the Center for Disease Control.

Fortunately, employers can play an important role in preventing flu, helping to protect employees’ health and reducing losses in productivity and revenue.

Click here to download the Influenza Checklist for tips and suggestions on how to prepare employees for the season ahead and respond in the event of an outbreak.

Laugh a Little

Fate is like a strange, unpopular restaurant filled with odd little waiters who bring you things you never asked for and don't always like.

- Lemony Snicket


10 low-cost ways to market your business
used with permission from Microsoft For Your Business

Too many small-business owners think marketing is like a trip to the dentist—something you just have to do every six months or so.

When marketing is continuous and targeted, business gets easier. If prospects have a positive view of your products and reputation, you're that much closer to getting a sale.

Here are 10 ideas for doing that—on the cheap.

Read more

Innovations you'll be using next year
used with permission from HP Technology at Work

As 2015 draws to a close, it's time to take a look at some of the innovative tech primed to make a splash in the New Year. While some of these tech trends have already begun to garner attention, what will really launch them into the public consciousness is the way each seeks to rewrite the rules for its industry in order to do something new—from improving bad cell phone reception to reinventing 3D printing for a new generation of businesses.

Multi-cell networks

Wireless providers traditionally operate in siloes. They have their own plans, their own defined networks, and sometimes even their own phones. As a result, reception in different locations can be inconsistent from network to network—as is evident in wireless providers' coverage maps. Multi-cell networks seek to solve that problem by overlapping two or more networks to create a "network of networks".1

Read more

Why Smartphones and Tablets Need Security Software
used with permission from Norton by Symantec
by Nadia Kovacs

You install Internet security software on your computer, but what about your smartphone or tablet? If you think the mobile devices don't require security software, well, you'd be wrong. Treating your smartphone or tablet in the same manner you do your laptop is crucial, as these devices are actually just smaller, powerful computers.

According to Symantec's 2015 Internet Security Threat Report, it was discovered that 17 percent of all Android apps (nearly one million total) are actually malware in disguise. This includes 46 new families of Android malware in 2014.

Read more

Spotting the signs of a B2B scam
used with permission from FTC Business Center Blog
by Lesley Fair

A small business or nonprofit gets what appears to be an invoice for a listing in an online yellow pages directory. On the face of it, it looks legit. It includes the name of an employee at the office, a copy of what the listing looks like, the "walking fingers" symbol associated with directories — and a demand for the $486.95 the business or nonprofit supposedly owes for the listing. What's really going on? As an FTC case against Canadian scammers suggests, chances are it's a fraud targeting small businesses, doctors' offices, retirement homes, churches, etc. And your company or community group could be at risk.

Read more

Operating in the fourth industrial revolution
used with permission from IBM Big Data & Analytics Hub
by Karen Butner

Writing in the Harvard Business Review, Michael Hammer once defined operations innovation as "truly deep change" in core activities and processes. However, he added, this entails more than mere operational improvement or excellence—it necessitates "a departure from familiar norms and requires major changes in how departments conduct their work and relate to one another." More than a decade later, well into the era of digital operations, such deep change is more essential than ever.

Read more

168 Thatcher Rd.    |   Greensboro, NC  27409   |    336-632-0860   |

Symantec - Microsoft - Sonicwall - VMWare