Netsurion SOC Catch of the Day

Netsurion SOC Catch of the Day

Cryptomining via PowerShell Caught at Retailer.   The Netsurion EventTracker SOC reviews billions of logs daily to keep their customers safe from advanced threats. The EventTracker SOC (Security Operations Center) detected malware that bypassed the customer’s traditional Anti-Virus (AV) software. Cryptomining malware infects workstations and laptops to create armies

Our Vendor Card

Our Vendor Card

  In response to the COVID-19 pandemic, we are finding many organizations that are in need of additional IT equipment for those who are working from home. Desktops Laptops Printers Monitors Headsets   Please let me know if you have any immediate needs

Diversified Procurement

Diversified Procurement

Diversity. It’s a word you hear quite often. While this is especially true in the tech industry, companies in every sector are working to promote diversity. It’s an issue that has become increasingly important. The fact that the United States’ demographic landscape is rapidly changing gives this issue even more weight.

TCGi Holiday Newsletter & Year in Review!

TCGi Holiday Newsletter & Year in Review!

2019 has been a whirlwind year for TCGi.  The purchase of BigVar and expansion as a value-added reseller of IT hardware and software has been very successful. TCGi was also excited to be invited to become a member of the 2019 WBENC Conference & Business Fair’s Host Committee.  Avis presented

Rugged vs Non-Rugged Mobile Devices

Rugged vs Non-Rugged Mobile Devices

  Let’s face it, regular laptops, tablets and 2-in-1 devices are not made for outdoor work. Most portable devices are at a significantly greater risk of being damaged. Damage can occur in a number of ways: drops, spills, dirt, dust, extreme temperatures and vibration. Yet those companies who employ workers

Authentication vs. Access Controls vs. Authorization

Authentication vs. Access Controls vs. Authorization

An excerpt from “Authentication vs. Access Controls vs. Authorization” Blog – December 7, 2019 – CloudKnox team   Understanding identity security:  In the past, access control has largely been synonymous with authorization. However, the highly automated and dynamic nature of cloud infrastructure demands that we reexamine these concepts by deconstructing their true