TEC Technology Blog

The 5 MUST-haves for a successful digital workplace

Digital collaboration is supposed to make work easier, right? But if the tools that are supposed to make working together simple don’t actually boost productivity and efficiency, what’s the point?
About 88% of CEOs believe digital technologies are creating high value in operational efficiency. In order to have the operational…

Security Round Table

Recently TEC Communications hosted our Executive only Security Round Table Michael Wilcox, Cisco Chief Information Security Officer. While we had high level discussion on all things cybersecurity and the security issues that are prevalent today, we also enjoyed great food from Westwood Country Club!

Thank you to all that attended…

Company Spotlight: Life After a Ransomware Attack

Life after a ransomware attack

Security breaches are happening every day and more and more they result in a ransomware attack. Hackers are creating advanced malware that can evade even the best detection tools. See how one company dealt with this ever-growing threat landscape.

 

 

 

The Situation
The Director…

Inside Ransomware

Ransomware, it’s a big deal. But how much do you know about this cybersecurity threat?
Find out more on this damaging malware:
Ransomware is big business – Learn how to protect your data

[i] David Fitzpatrick and Drew Griffin, “Ransomware is expected to gross cyberthieves $1 billion in…

How does your customer service stack up against Amazon?

What makes your favorite store your favorite store? More than likely it’s not just the products that compel you to return, but rather the experience. It’s reported that 97% of consumers say that customer experience is very important in their decision to return and make repeat purchases.

So what can…

5 Tips for Choosing a Next-Generation Endpoint Security Solution

You know that the devices your people use on your network are some of the greatest points of cyber security vulnerability so you want the best network security tool possible to prevent and combat cyber-attacks. Here are 5 tips for choosing the best Endpoint Security Solution for your network.
Cyber-attack…

Frank Keogh

Frank is a systems engineers, specializing in network consulting for LAN, WAN, cybersecurity and data center/hyperconvergence.
Credentials? Plenty. CCNA, CCDA, CCNP, CCSP, VCP5-DCV