The View From NCS Technologies

Mike Turicchi

Recent Posts

Test drive the most innovative remote work solutions

Posted by Mike Turicchi on Sep 15, 2022 5:10:37 PM

Like it or not, remote work is now an institution. And that means businesses must offer solutions that maximize the comfort and productivity of their remote staff. Our team at NCS Technologies, Inc. can show you innovative solutions that do just that. Book your free demo today.
Read More

Scammers Sent Uber to Take Elderly Lady to the Bank

Posted by Mike Turicchi on Sep 15, 2022 3:10:46 PM

Email scammers sent an Uber to the home of an 80-year-old woman who responded to an email ruse to trick her into wiring money from the bank to the fraudsters. Although the woman caught on to the scam before going to the bank, her story is a chilling reminder of how far crooks will go to rip people off. Read this KrebsonSecurity blog post for insight on the rise in cyber-attacks on people over 60.
Read More

Remote work effectiveness requires adjusting expectations

Posted by Mike Turicchi on Sep 15, 2022 12:10:24 PM

In this interview, author James Stanier provides an in-depth analysis of remote work effectiveness for individuals and teams, including the critical need to adjust communications expectations.
Read More

At a Glance: Safer Schools and Campuses

Posted by Mike Turicchi on Sep 15, 2022 10:11:36 AM

This fact sheet provides an overview of the myriad ways in which Cisco helps create safer campuses. Because no single measure can prevent all danger, the most effective approach relies on a concert of security solutions working together. Whether it be comprehensive surveillance to access control and collaboration solutions, contact us today to learn how Cisco can help.
Read More

Twilio Employees Duped by Text Message Phishing Attack

Posted by Mike Turicchi on Sep 13, 2022 5:10:40 PM

Multiple employees of Twilio, the customer engagement platform provider, were duped into providing their credentials to threat actors in a phishing campaign the company described as a "sophisticated social engineering attack." Read the blog to learn how the threat actors beat Twilio at its own game and steps taken by the victim to contain the damage.
Read More

eBook: Meraki Security in Education

Posted by Mike Turicchi on Sep 13, 2022 12:16:13 PM

This eBook explains how Cisco Meraki keeps schools safe using the perfect blend of endpoint, network, and physical security. Better yet, all products are managed entirely through an intuitive, web-based dashboard that's updated automatically, delivering a new level of scalability and control. Contact us for more information regarding these unparalleled solutions.
Read More

HP Wolf Security Tech Whitepaper — Advanced Endpoint Security

Posted by Mike Turicchi on Sep 13, 2022 10:08:36 AM

As companies continue to digitally transform themselves and employees spread out from the office to work remotely, there are greater pressures on the IT department to keep the organization safe from cyber criminals. Download this informative whitepaper showing how HP Wolf Pro Security Edition protects against today's threat landscape with enterprise-level security.
Read More

The Cyber Threats and Trends That Will Dominate Going Into 2023

Posted by Mike Turicchi on Sep 12, 2022 5:16:56 PM

Predictive intelligence assessments of threats organizations should prepare to thwart over the coming year are starting to come out. Based on commonly used tactics, techniques and procedures, predictions point to continuing increases in ransomware attacks and demands for network access among other trends. Read this blog for a summary of projected threat trends and what organizations need to address them.
Read More

Everything You Need to Work From Home Like a Pro

Posted by Mike Turicchi on Sep 12, 2022 3:10:42 PM

As we all know by now, working from home has its perks and downsides. Without the right workstation solutions, your remote employees' comfort, productivity and morale could suffer. Here are some solutions to ensure that doesn't happen.
Read More

PDF Malware is Not Dead

Posted by Mike Turicchi on Sep 12, 2022 12:10:58 PM

Cyber attackers have figured out that by infecting file types that most people use daily they can spread malware farther and easier. Take a look at this eye-opening HP Threat Research blog that shows how common malware packages are in Microsoft Office file formats, particularly Word and Excel.
Read More