January 2017 Newsletter
2017 Means TCS is Entering its 27th Year in Business
by Barry Utesch
Reflecting:
It is hard to believe that we've been serving Central North Carolina for 27 years. I still remember the day I started in a 12x12 office on High Point Road in Greensboro. A six-foot table, my telephone and a newly purchased piece of high tech equipment called a fax machine. Back then if you wanted to “download” a file you had to dial into the manufacturer via modem and download directly from them. That was also when a color monitor was rare because the price was more than double what a green screen cost.

Continue reading »

Sneaky Spammer Tactics and How To Avoid Them
used with permission from Norton by Symantec
by Nadia Kovacs
Spam is a problem on the Internet, coming at us from just about every angle of the online space. Some spammers develop sophisticated, well-planned strategies, while others can be sloppy and still drive results. Either way, spam tactics come in a variety of shades, and it's up to users to identify signals early on and avoid unsolicited content.

Here's a look at some spam tactics used in popular Internet spaces. Become familiar with these tactics to help identify them and avoid them whenever possible.

Continue reading »

Social Media Scams Based on Current Events
used with permission from Norton Protection Blog
by Nadia Kovacs
We are sure you've seen them lurking in your news feeds- breaking news reporting a celebrity's death, photos of natural disasters striking major cities, video footage of riots and outrage over an accidental shooting- all seemingly legitimate news stories. However, this "news" may not be what it seems.

As of March 31, 2014, Facebook has reported that it has 665 million daily active users.


Continue reading »
Survey reveals customers crave digital experiences
used with permission from Microsoft US Small and Midsize Business Blog
by Cindy Bates
More than ever before, customers want to interact digitally with businesses in the same way as they do with friends and family; through social media and mobile devices. These insights are revealed through a recent Microsoft survey of over 1,000 U.S. consumers that uncovered shifts in the ways customers want to hear from businesses.

Continue reading »
 
Important Scams to Watch for and Tips to Keep Your Business Safe While Using Social Media
By: Jessica Clifford
Social media has already consumed our personal lives, but now social sites, with their inexpensive forum for marketing, networking, and client out-reach, are approaching our companies with a friendly vengeance. Most company websites use social media to encourage clients to follow them on Facebook, Twitter, Instagram, and so on, helping their clients become the first to hear news about their brand, upcoming events, or sales. Yet, social media does have its negatives, such as phishing extortion, shortened URLs, and fake accounts attacking a businesses’ privacy. With countless benefits, how does a small company stay protected while using social media? The answer is simple: know what you are looking for.

According to experts from the security firm, Proofpoint, “phishing attempts are up this year by 150% on major social networks like Facebook, Twitter, Instagram, and LinkedIn”.

Continue reading »
Business Continuity Tip
How to Set up Two Step Authentication

Recently Yahoo announced another significant security breach, leaving not just Yahoo users, but all online users wondering how they can protect their digital information in what seems to be a never ending cycle of breaches.

One solution, known as "two factor authentication" can help. In the process, you add an extra layer of security to your account by requiring two key elements:
  • Something you know, such as your password or pin
  • Something you physically have, such as a fingerprint, or most commonly a code sent to your phone.
To help you get started, we compiled the following list of popular services and links to instructions on how to activate two factor authentication: Gmail, Yahoo, and Apple ID.

To learn more about two factor authentication and how it works, click here.
 
IT Services and Support for Your Business
Total Computer Solutions
168 Thatcher Rd. | Greensboro, NC 27409
 336-632-0860 | tcsusa.com