TEC Technology Blog

Company Spotlight: Life After a Ransomware Attack

Life after a ransomware attack

Security breaches are happening every day and more and more they result in a ransomware attack. Hackers are creating advanced malware that can evade even the best detection tools. See how one company dealt with this ever-growing threat landscape.

 

 

 

The Situation
The Director…

Inside Ransomware

Ransomware, it’s a big deal. But how much do you know about this cybersecurity threat?
Find out more on this damaging malware:
Ransomware is big business – Learn how to protect your data

[i] David Fitzpatrick and Drew Griffin, “Ransomware is expected to gross cyberthieves $1 billion in…

How does your customer service stack up against Amazon?

What makes your favorite store your favorite store? More than likely it’s not just the products that compel you to return, but rather the experience. It’s reported that 97% of consumers say that customer experience is very important in their decision to return and make repeat purchases.

So what can…

5 Tips for Choosing a Next-Generation Endpoint Security Solution

You know that the devices your people use on your network are some of the greatest points of cyber security vulnerability so you want the best network security tool possible to prevent and combat cyber-attacks. Here are 5 tips for choosing the best Endpoint Security Solution for your network.
Cyber-attack…

Frank Keogh

Frank is a systems engineer, specializing in network consulting for LAN, WAN, cybersecurity and data center/hyperconvergence.
Credentials? Plenty. CCNA, CCDA, CCNP, CCSP, VCP5-DCV

Engineers Corner: Remodeling? Plan Your Wireless Access Points

Remodeling an office can be a heavy burden involving many decisions, such as replacing wireless access points. TEC Engineer Alex discusses how he chose a solution that would provide faster and reliable transmissions to employees.

The Situation

As a customer was remodeling one of their branch offices, they also planned on…

Balancing VPN Security and Ease of Use

VPN Security – What could go Wrong??
Remote worker frustrated with VPN security

Nearly everybody uses multiple devices to connect to the network wherever they are and you know your company isn’t an exception. With these multiple endpoints, though, lies a greater risk of cyber hackers breaching your…