TEC Blog

Security Round Table

Recently TEC Communications hosted our Executive only Security Round Table Michael Wilcox, Cisco Chief Information Security Officer. While we had high level discussion on all things cybersecurity and the security issues that are prevalent today, we also enjoyed great food from Westwood Country Club!

Thank you to all that attended…

What “signs” are you missing to keep your customers happy?

Sally walks into a store and is looking around to learn more about a new product. This is something that a merchandiser would assume is easy due to  the layout and signage in the store, but Sally is having trouble and eventually leaves without making a purchase.

This happens more…

Company Spotlight: Life After a Ransomware Attack

Organizations are under attack, and security breaches are happening every day. Hackers are creating advanced malware that can evade even the best detection tools. See how one company dealt with this ever-growing threat landscape.

 

 

 

The Situation
The Director of Information Technology at a mid-market transportation and logistics company had various security…

Inside Ransomware

Ransomware, it’s a big deal. But how much do you know about this cybersecurity threat?
Find out more on this damaging malware:

[i] David Fitzpatrick and Drew Griffin, “Ransomware is expected to gross cyberthieves $1 billion in 2016 says FBI,”  CNN Money, April 15, 2016 (http://money.cnn.com/2016/04/15/technology/ransomware-cyber-security/) [ii] “40 Percent of Enterprises…

How does your customer service stack up against Amazon?

What makes your favorite store your favorite store? More than likely it’s not just the products that compel you to return, but rather the experience. It’s reported that 97% of consumers say that customer experience is very important in their decision to return and make repeat purchases.

So what can…

5 Tips for Choosing a Next-Generation Endpoint Security Solution

When it comes to your network and data, you want to make sure you have the best security solutions. Make sure you follow these 5 tips for choosing an Endpoint Security Solution.
1. Prevention Capabilities
The first line of defense is prevention. You want to be able to prevent cyberattacks and…

Engineers Corner: Remodeling? Here’s something to consider

Remodeling an office can be a heavy burden involving many decisions, such as replacing wireless access points. TEC Engineer Alex discusses how he chose a solution that would provide faster and reliable transmissions to employees.

The Situation

As a customer was remodeling one of their branch offices, they also planned on…