TCS Data-bits
May 2016   
    In this issue. . .
- TCS Supports the Winston Salem Symphony
- 6 security red flags when identifying the perfect cloud storage solution
- What is Grayware, Adware, and Madware?
- Are you Keeping Ecommerce Info Safe?
- Business Continuity Tip
- Quote & Cartoon
         
 

Let TCS Help You With Your IT Needs

Phishing Attack


Business Continuity Tip
Arm Your Smartphone

Chances are your smartphone is within arms reach right now. It's no surprise then that our phones are often the first source of critical information and updates in the event of an emergency.

But with so many options for information out there, how do you know where to start? To help you narrow it down, here is a list of top three favorite apps available to both iPhone and Android users.

Read more
  

Laugh a Little


I will love the light for it shows me the way, yet I will endure the darkness because it shows me the stars.

- Og Mandino

 

TCS Supports the Winston Salem Symphony

TCS and some of our clients enjoyed a fun evening supporting the Winston Salem Symphony and the Beach Boys Tribute Band, while singing along to sun-melt harmonies of hot rods, surfing and girls.


6 security red flags when identifying the perfect cloud storage solution
used with permission from Microsoft Office Blogs

For a long time, the cloud was considered the "wave of the future." But the future has arrived. A great cloud storage solution not only allows your employees access to files anytime, anywhere—it also makes it simple to sync files, work on the go and share and coauthor documents with ease. But more than 50 percent of organizations find cloud storage to be the riskiest cloud app category.

A big reason for that? Security threats. Despite all the data out there showing the cloud to be just as or more secure as on-premises storage, security remains the top barrier to cloud adoption, according to the Cloud Security Alliance. That's why cloud security is one of the top concerns for providers—and why they spend so much capital making sure their products are secure. In fact, by 2019, the global cloud security market alone will have reached an estimated $8.71 billion.

Read more

What is Grayware, Adware, and Madware?
used with permission from Norton by Symantec
by Nadia Kovacs


If you're like most Internet users, you've never even heard of grayware, adware or madware. That's because these are all lower on the threat scale in the world of malicious programming. What's more, they toe the line between legitimate programs and actively harmful applications.

Here's your quick guide to the new wave of code you don't want on your computer:

Read more

Are you Keeping Ecommerce Info Safe?
used with permission from SBA.gov
by Bridget Weston Pollack


Ecommerce has become commonplace as businesses and online tools have made it easier and easier to exchange goods and services with customers around the globe.

While some consumers may have advanced knowledge of online security practices and feel confident shopping on various ecommerce sites, other consumers may not feel as comfortable. It's up to you as a business owner not only to convince potential customers to shop with you, but also to protect their information online. Follow best practices to protect your customers' sensitive online data.

Read more

168 Thatcher Rd.    |   Greensboro, NC  27409   |    336-632-0860   |   tcsusa.com

Symantec - Microsoft - Sonicwall - VMWare