TLC Solutions Blog

WARNING: What Every Business Owner Needs To Know About Phishing Scams

June 12, 2019

IT Security, phishing

By TLC Staff

Knowing this information could save your business

There were 14.5 billion spam emails sent every day in 2018. The odds are pretty good that you received a few of those. Surprisingly, the good news...

Read More
SHARE THIS PAGE

Password Security

February 08, 2019

IT Security, data security, Password Security

By TLC Staff

Repeat after me – password security is important!

Read More
SHARE THIS PAGE

7 Precautions to Take Against Ransomware Attacks

October 11, 2016

IT Security

By Aimee

 

A couple of weeks back, we’ve shared what happens to your data in a ransomware attack. It can be costly and inconvenient for regular folks losing personal data, but even more costly and critical...

Read More
SHARE THIS PAGE

So This is What Happens in a Ransomware Attack

September 26, 2016

IT Security

By Aimee

 

“My data was held ransom. And I did it on purpose.”

Masood Nasir, a Telus Information Security Consultant, decided it was time to see how ransomware attack looks like and how damaging those spam...

Read More
SHARE THIS PAGE

The Three Ways Trend Micro Security Blocks Ransomware

September 02, 2016

IT Security, Feature Friday, Trend Micro

By Aimee

What ransomware does is lockdown or destruction of your most valued digital assets, unless payment is made. And it’s usually a LOT of money.

It is a scary thing to happen to businesses and what’s...

Read More
SHARE THIS PAGE

What You Need to Know About Cryptolocker

August 29, 2016

IT Security, Phishing Attacks, Cryptolocker

By Raymond

 

First of all, the name Cryptolocker is only a variant of the malicious software called ransomware.The name was made famous as it was one of the first kind of Trojan virus to lock your files and...

Read More
SHARE THIS PAGE

What You Need to Know About Phishing Attacks and How to Avoid Them

July 25, 2016

IT Security, Phishing Attacks

By Aimee

 

We have always said that this digital era, with its ever growing data, is swarmed as well with a growing number of malicious individuals. Their goal is to steal data, no matter its value to them...

Read More
SHARE THIS PAGE

There's One More Thing to Add to Your Travel Checklist and It's Not What You Think

June 27, 2016

IT Security

By Aimee

 

If you think that because you're on a summer vacation, you're safe from cyberhacks, then think again. While the prospect of travelling is tempting, summer is also a favorite season among...

Read More
SHARE THIS PAGE

9 Ways to Keep Computer Security Intact

May 23, 2016

IT Security

By Aimee

 

Cyber security threats have become more real now than ever with them not being confined to just computers but also on smartphones, tablets and basically anything in the digital world. Cyber...

Read More
SHARE THIS PAGE

You'll Be Surprised at How Vulnerable Your Password Security Can Be

April 11, 2016

IT Security

By Aimee

 

The recent leak of the list of political figures with offshore holdings designed to hide their wealth in the widely-known Panama Papers should give us all a wake-up call on our own password...

Read More
SHARE THIS PAGE

Subscribe to Our Blog

New Call-to-action

Recent Posts

New Call-to-action
New Call-to-action