TCS Data-bits
October 2016   
    In this issue. . .
- Keep Your Home Wi-Fi Safe in 7 Simple Steps
- Brace yourself—top 6 must-have video conferencing tools
- Enable or disable Internet Explorer add-ons
- The TCS Approach to Security
- First Line of Defense Against Cybercrime
- Business Continuity Tip
         
 

First Line of Defense Against Cybercrime
By: Barry Utesch, President

With the continuing problems of cybercrime and cyber-attacks, I felt the need to discuss what is arguably the first line of defense that is in your control and that is passwords.

We tend to have a love-hate relationship with passwords. We love our current password and hate to change to a new one. When we change our password, we have to either look it up or pause to remember what it is and that is a pain. Yet instinctively, we know that our current password probably isn't as secure as it needs to be.

Most support desk personnel will tell you that resetting passwords are one of the most common calls they get..

Read more


Business Continuity Tip

National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month! You may not consider your small businesses a target for cyber attacks due to size or because you don't think you have anything worth stealing. However, small businesses have valuable information cyber criminals seek, such as employee and customer records, bank account information and access to the business's finances, and access to larger networks.

In some ways, small businesses are at a higher risk of cyber attacks than larger businesses because they often have fewer resources dedicated to cybersecurity. Keep your business secure and check out resources and materials here!

Keep Your Home Wi-Fi Safe in 7 Simple Steps
used with permission from Norton by Symantec
by Christina Schubert


It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads to increased productivity. It is safe to say that the Internet is for everyone and does not limit itself to the tech savvy. Unfortunately, when not safeguarded, the Internet can be a playground for nefarious activities caused by people with malicious intent.

Take a home wireless network as an example. Almost every member of the family accesses it through laptops, PCs, cell phones and tablets. With the Internet of Things, there is a gamut of other elements in the home that access the Wi-Fi. A small vulnerability in the home Wi-Fi network can give a criminal access to almost all the devices that access that Wi-Fi. This could spell trouble for bank accounts, credit card details, child safety, and a whole lot of other concerns.

Read more

Brace yourself—top 6 must-have video conferencing tools
used with permission from Microsoft Office Blogs

Whether your company has offices scattered throughout the country (or the world), relies on a team of road warriors, has embraced telecommuting, or has clients in cities near and far, video conferencing can make the miles between you virtually disappear. After all, with today's newest video conferencing tools, you can connect, share, see, hear and collaborate—no matter where you are. In fact, it's almost better than being in the same room.

But how can you achieve such a feat of collaboration within your own organization? With technology that boasts all the right features, it's easy.

Here's our list of six must-have tools for seamless video conferencing for businesses of every size:

Read more

Enable or disable Internet Explorer add-ons

How do you manage Internet Explorer add-ons? Perhaps you have an unwanted extension or a pesky toolbar cluttering up your browser. Maybe another program installed an extra toolbar you really don't need. Or maybe your favorite extension is disabled and you want to bring it back. Here's how!

Finding where to manage Internet Explorer add-ons is very easy!
  1. Click on the Tools gear icon in the upper right corner of the program.
  2. On the menu that appears, click Manage Add-ons.
Read more

The TCS Approach to Security

Using the broadest definition, Network Security would include everything that is a threat to the applications and data that you use to run your business. Yes, a malicious hacker might want to attack your company's network, but statistically the inability to access your data is most likely the result of equipment failure.

At TCS, we take a reasoned approach to our client's security needs:
  • If your firm can tolerate 4 hours of downtime without serious hardship to your business, then it would be foolish to spend thousands of dollars necessary to achieve downtimes under 4 hours.
  • If 10 minutes of downtime would be a serious hardship because of regulatory compliance or lost revenues, then it makes sense to spend the money and do it right.
Regardless of which end of this spectrum your firm is on the first step is to determine what your true cost of downtime is and then we work with you to tailor a solution that fits your budget.

Read more

168 Thatcher Rd.    |   Greensboro, NC  27409   |    336-632-0860   |   tcsusa.com

Symantec - Microsoft - Sonicwall - VMWare