September 6, 2023
September 2023 – TEC Communications, a leading provider of versatile IT solutions and managed services, is excited to announce the successful renewal of its Cisco Customer Experience Specialization (CX) certification.
This recognition, the Cisco Customer Experience Specialization, is a testament to TEC Communications’ outstanding expertise in crafting and seamlessly integrating…
May 24, 2023
In today’s interconnected world, effective communication and seamless collaboration are crucial for businesses to thrive. Webex Calling and Microsoft Teams have emerged as two prominent solutions that address these needs. Combining the power of Webex Calling with the collaborative features of Microsoft Teams offers a winning combination that enhances…
October 29, 2022
How to avoid the TRICKS by being aware of the tactics:
As National Cybersecurity Awareness month comes to a close on Halloween, It can be spooky knowing that cybercriminals are trying their best to trick you. Check out these tips to stay safe online and protect yourself and your…
May 5, 2021
E911 Requirements
Keeping customers and employees safe within business environments requires intentional planning. Those business environments include all employees, whether they are onsite, remote or working from home. Your company is responsible for compliance of federal and state laws. TEC has technology solutions to meet the emergency response requirements to…
July 3, 2018
Cloud storage is a rather straightforward concept – a service where data is remotely maintained, managed and backed up, allowing users to store their information online with access from ANY location – anywhere in the world – via the Internet (with a private cloud hosting solution residing on an…
January 8, 2018
SUMMARY
On January 3, 2018 researchers disclosed three vulnerabilities that take advantage of the implementation of speculative execution of instructions on many modern microprocessor architectures to perform side-channel information disclosure attacks. These vulnerabilities could allow an unprivileged local attacker, in specific circumstances, to read privileged memory belonging to other processes…
October 18, 2017
OVERVIEW
On October 16, 2017, a weakness was identified in the Wi-Fi Protected Access 2 (WPA2) protocol. Multiple Cisco wireless products are affected by these vulnerabilities (listed below). Successful exploitation of this weakness could allow for an attacker to decrypt Wi-Fi traffic, perform content injection, or hijack TCP connections to…