TEC Technology Blog

3 Essential Features of a Modern Enterprise Cybersecurity Solution

TEC Tech Quick Hits

In Cisco’s 2017 Annual Cybersecurity Report, Cisco’s SVP of Security, John N. Stewart, had the following to say:
“It’s really quite simple: The more attack vectors that go unnoticed and the longer we allow attackers time to exploit our systems and infrastructure, the greater their chance for…

Top 5 Damaging Ransomware Attacks

What one word can strike fear into end users, security pros, and CIOs? Ransomware. This malware has raised to infamy recently with many major-headline attacks hitting all over the world. These recent attacks don’t indicate a new form of attack, ransomware has actually been around just about as long…

The 5 MUST-haves for a successful digital workplace

Digital collaboration is supposed to make work easier, right? But if the tools that are supposed to make working together simple don’t actually boost productivity and efficiency, what’s the point?
About 88% of CEOs believe digital technologies are creating high value in operational efficiency. In order to have the operational…

Security Round Table

Recently TEC Communications hosted our Executive only Security Round Table Michael Wilcox, Cisco Chief Information Security Officer. While we had high level discussion on all things cybersecurity and the security issues that are prevalent today, we also enjoyed great food from Westwood Country Club!

Thank you to all that attended…

TEC Communications Chat