TEC Technology Blog

Top 5 Damaging Ransomware Attacks

What one word can strike fear into end users, security pros, and CIOs? Ransomware. This malware has raised to infamy recently with many major-headline attacks hitting all over the world. These recent attacks don’t indicate a new form of attack, ransomware has actually been around just about as long…

The 5 MUST-haves for a successful digital workplace

Digital collaboration is supposed to make work easier, right? But if the tools that are supposed to make working together simple don’t actually boost productivity and efficiency, what’s the point?
About 88% of CEOs believe digital technologies are creating high value in operational efficiency. In order to have the operational…

Security Round Table

Recently TEC Communications hosted our Executive only Security Round Table Michael Wilcox, Cisco Chief Information Security Officer. While we had high level discussion on all things cybersecurity and the security issues that are prevalent today, we also enjoyed great food from Westwood Country Club!

Thank you to all that attended…

Company Spotlight: Life After a Ransomware Attack

Life after a ransomware attack

Security breaches are happening every day and more and more they result in a ransomware attack. Hackers are creating advanced malware that can evade even the best detection tools. See how one company dealt with this ever-growing threat landscape.

 

 

 

The Situation
The Director…

TEC Communications Chat