Stay Current on the Ever-Changing World of IT with TCG’s Blog

Man Sitting in Front of Laptop Computer BlogConstruction
July 7, 2020

The Top 8 Cybersecurity Threats of 2020

Imagine an office building. The staff punches in at 9 AM and out at 5 PM. They take an hour for lunch. They get paid twice a month. It’s like…
Zoom Video Conferencing on Computer Monitor BlogStartup
April 16, 2020

Secure Your Zoom Accounts: 500,000 Accounts Have Already Been Compromised

More than half a million Zoom accounts have been exposed to hackers according to research from the cybersecurity firm Cyble. Many of the credentials are being sold on the dark…
Zoom Web Conference Blog
April 8, 2020

While Zoom Security Concerns Persist, Microsoft Offers Teams as a Safer Alternative

As millions of Americans explore ways to work remotely while maintaining efficiency, video conferencing has become more important than ever before. But which application is right for your company? One…
Warship device hidden in cardboard box BlogNon-Profit
March 31, 2020

Hackers at your Doorstep: The Threat of Warshipping

According to a recent Washington Post-ABC News poll, 90% of Americans are staying home to prevent the spread of the Coronavirus. Instead of venturing out to stores to make purchases,…
Wireless Router on Computer Desk Blog
March 27, 2020

Work From Home Employees Having Slow Internet Issues?

Problem: As more staff members work from home during the COVID19/Coronavirus pandemic, internet slowness / bandwidth issues can limit productivity. Potential solutions: Consider using an ethernet cable to connect directly…
woman-in-blue-floral-top-sitting-while-using-laptop-806835.jpg Accounting & FinanceBlog
March 24, 2020

COVID-19 Prep: Does Your IT Strategy Include Resiliency & Redundancy?

The COVID-19/Coronavirus crisis has highlighted a lack of resiliency and redundancy for many organizations. Due to the wildly unpredictable conditions we find ourselves in, IT budgets have been stretched thin.…
March 12, 2020

The Health of Your Business: 4 Things to Consider in the Pandemic Era

The Coronavirus / COVID-19 virus has brought healthcare back to the forefront of our national conversation. As a Managed Services Provider, TCG has frequently drawn a comparison between personal health…
CyBlok Logo Image Blog
February 18, 2020

Press Release: TCG Unveils CyBlok to Meet Clients’ Cybersecurity Needs

Natick, Mass., January 28, 2020 - TCG Network Services – the Northeast’s premier Managed Services Provider – is proud to announce the launch of its latest Security Information and Event Management (SIEM) product, CyBlok,…
Ransomware Myths Blog
January 15, 2020

Don’t Fall for These 3 Ransomware Myths

As companies continue doing more online, business owners need to be on the lookout for hackers trying to steal their data. Over the last few years, ransomware has emerged as…
IT Health Check BlogHealth-Medical
January 15, 2020

IT Health Check: 10 Questions to Ask Your Business In 2020!

Would you like to speak with IT professionals that can help you keep your technology resolutions in 2020? Call us at 866-TCG-NETW or contact us here!
The Perils of Holiday Shopping Online @ Work Blog
December 15, 2019

The Perils of Holiday Shopping at Work

So December isn’t exactly top-of-the-charts when it comes to economic output. Americans love the holidays and according to a study by Robert Half Staffing, 52% of professionals say they’ll be…
December 11, 2019

Top 15 Reasons to Choose Managed IT Services Over Break/Fix

In the world of outsourced IT, there are many kinds of vendor-client relationships, but they generally fall into one of two categories: Break/Fix and Managed Services. Break/Fix is a fee-based…
November 21, 2019

End of the Road for Windows Server 2008

What OS does your business’ server run? If you’re not sure, now is the perfect time to find out. Two market-leading products, Microsoft Windows Server 2008 and 2008 R2, are…
November 1, 2019

Protect Your Business with 3 Gift Ideas

The holidays are almost here and now is the time to start thinking about what you’re going to buy for the people closest to you. It’s also a good idea…
October 16, 2019

Unsafe Email Is Just Asking For Compromise!

If you believe your email is private and secure, think again. In today’s high cyber threat world, you need as much protection as possible. With more companies deploying Office 365,…
October 7, 2019

SMBs Pain Tolerance For Data Loss & Recovery Time?

Small to medium sized businesses need data backup and recovery as an insurance policy! Data loss can come from hardware failure, virus intrusion, accidental loss of data, software corruption, natural…
cybersecurity Blog
October 2, 2019

The 4 Types of Data Breaches You Need to Know

If you were hit with a data breach, would you know? It seems like a silly question, but companies take an average of more than 190 days to identify a data breach.…
microsoft ending support Blog
September 1, 2019

How Are You Preparing for 2020’s Microsoft End-of-Support List?

If you’re like most businesses, you’ve been seeing notifications start to surface about a daunting change to your business. Coming January 14, 2020, Microsoft® will no longer be providing support…
August 13, 2019

Press Release: TCG Kicks Off Healthcare Month

Natick, Mass., August 13, 2019 - TCG Network Services is proud to announce that the month of August will be focused on reaching and supporting healthcare providers throughout the region. “The…
business continuity plan Blog
August 2, 2019

How Business Continuity Plans Differ from Disaster Recovery Plans

Nobody likes to think about worst-case scenarios when it comes to their business. Unfortunately, your company is susceptible to a wide variety of natural disasters, structure fires, and cybersecurity attacks.  To be prepared…
July 16, 2019

CyBlok Product Announcement

Hackers are tenacious. They spend days, weeks, even months searching for entry into your network. Once they gain access, these criminals devote more than 200 days on average before they’re…
June 28, 2019

Can Your Business Survive a Data Disaster?

It’s not a matter of “if,” it’s a matter of “when” your company will face a data disaster. These data disasters can come in many forms, including hardware and software…
June 12, 2019

The Data Compliance Cheat Sheet

If you had to list your company’s assets, a lot of tangible things come to mind. What about data? It may not occur to you that the most valuable things you own are virtual.   Companies of…
June 3, 2019

The ABCs of IT Compliance

From A to Z, a great business leader knows their industry and the standards that it is held to. But with everchanging IT solutions to tackle threats and take advantage…
May 13, 2019

Press Release: TCG Announces Promotion of New Marketing Director

Natick, Mass., May 13th, 2019 - TCG Network Services is pleased to announce the promotion of Jonathan Browning to the position of Marketing Director. In this role, Mr. Browning will…
May 13, 2019

Press Release: TCG Sponsors Information Technology Security Summit

Natick, Mass., May 13th, 2019 - TCG Network Services announces their Silver Sponsorship of the 7th Annual Information Technology Security Summit, which they’ve done each year since 2012. The event…
May 3, 2019

5 Tools to Improve Project Management

A study by Hive found that 77 percent of high-performing projects use project management (PM) software. Considering that fact, it’s a surprise that a survey by Wellingtone found only 22…
April 1, 2019

3 Reasons Your Business Needs a vCIO

“Should I let my employees use their personal devices for work?”  “Will this new solution be a game-changer or a waste of my money?”  “How do I defend my data against the…
March 8, 2019

Finding the Right Cloud-Based Collaboration Tool for Your Business

The cloud hosts hundreds of tools and applications designed to improve security and collaboration, streamline operations and project management, and enhance your existing solutions. But, knowing which cloud-based tools are…
February 1, 2019

4 Ways to Meet Compliance with Innovative Cloud Technologies

According to IDC, no less than 60 percent of all IT spending and up to 70 percent of all software, services and tech spending will be cloud-based by 2020. Cloud-based…
January 1, 2019

Your Guide to Ethics & Privacy

In his 2009 paper Digital Ethics, Richard Capurro described digital ethics as, “the impact of digital Information and Communication Technologies (ICT) on our societies and the environment at large.” But,…
December 1, 2018

5 Questions You Should be Asking Before the New Year

When it comes to enhancing the way you do business, you’ve probably got a lot of questions. From implementing new solutions to boosting your existing services, deciding what is best for your…
November 1, 2018

Brilliant Tech Gifts for Home, Work and Play

As you consider holiday gifts for all the people who make your business a success – your employees, customers and partners – answer these three questions. Do the people on…
October 1, 2018

Out With the Old, In With the New – Upgrade Your Tech with Section 179

When new employees join your business, are they saddled with hand-me-down technology that’s seen better days? If you’ve tried to save money by stretching your computer capabilities over the course…
Plane Flying into Logan Airport Blog
September 21, 2018

Safe Travels: Cybersecurity on the Road 

You’re traveling for business tomorrow. You packed your bag. Bought your tickets. Booked the hotel. You even remembered to turn on the voicemail away message. Did you safeguard your technology?…
vCIO Virtual CIO Blog
September 1, 2018

Does Your Company Need a vCIO? Take Our Self-Assessment

If you’ve never heard of a virtual CIO, you probably assume you don’t need one. But, virtual CIOs, or vCIOs, give companies the benefit of a high-level technology executive without…
Cybersecurity Secure Password Blog
August 20, 2018

Eight Ways to Prevent Data Theft

Here are 8 steps that small and mid-sized businesses can take to prevent data theft:   Updates matter Unpatched computers, routers, servers, and other internet-connected devices are easy targets for…
What is a Zero Day Threat? Blog
August 6, 2018

What’s a “Zero-Day Threat”?

It isn’t the name of a hard rock band. Well, it might be at this point, but that’s not relevant in this context. A Zero-Day Threat is an attack that…
IoT Internet of Things Blog
August 1, 2018

How to Integrate IoT into Your Business: A Checklist for Getting Started

The Internet of Things (IoT) is impacting thousands of businesses every day, from connecting endpoints – like mobile devices, televisions and security systems – to streamlining processes by customizing experiences.…
#TCGmoves to new Natick office Blog
July 30, 2018

Press Release: TCG Plans Move to New Natick Office Building

Massachusetts-based IT Service Provider Transitions to Larger Location Within the MetroWest Community NATICK, Mass., July 30, 2018 ( - TCG Network Services – the Northeast’s premier Managed Services Provider – announces plans…
Social Engineering Red flags Blog
July 25, 2018

Social Engineering Red Flags

Want to download the PDF version? Click here.
AllWorx and TCG Network Services are partnering to offer Educational institutions discounts on VoIP phones. Blog
July 23, 2018

Allworx Educational Sales Promotion

Want to download the PDF version? Click here.  
What is GDPR and how does it affect my small business? Blog
July 11, 2018

Ready to hit the GDPR panic button?

Want to download the PDF version? Click here.  
Small Businesses can be bankrupted by unforeseen tragedies. Partnering with TCG can prevent the worst. Blog
July 1, 2018

5 Catastrophes that Made IT Disaster Recovery Critical in 2017

“Disasters don’t happen here.” That kind of thinking can be tempting when you’re deciding what IT recovery plan to include in your budget. But the truth is that major disasters…
How can Cisco Meraki hardware improve your small business? Blog
June 27, 2018

Cisco Meraki: The Cloud Managed IT Advantage

Maintaining network infrastructure is really challenging for most small and mid-sized businesses. The reason? Things are always changing. Employees come and go. Devices are purchased, repurposed, and scrapped. Security threats…
VoIP, phone, service, TCG Network Services Blog
June 20, 2018

Six Reasons to Switch: Find Your Company’s Voice with VoIP

When we mention to clients that we offer the best-in-class VoIP telephone system MaxCS by AltiGen Communications, one of the first questions we get is, “What exactly is VoIP?” Here’s…
cloud, services, email, skype, microsoft, azure, myths Blog
May 30, 2018

Five Myths About the Cloud – Debunked!

It’s human nature to be wary of something new, something different – something that seems too good to be true. Especially when it comes to your precious business dollars. After…
office 365 blog Blog
May 2, 2018

What? You’re Not Using Office 365? If You’re In The Weeds, We Can Help

Chances are that your competition is already using the Microsoft Office 365 suite of tools to maximize their productivity and grow their business, so why aren’t you? This is a…
unified communications blog Blog
April 2, 2018

Streamline Your Team’s Collaboration

5 Ways Unified Communications Helps Unified communications (UC) integrates instant messaging, presence information, voice, mobility, audio, web and more services to make the communication process between internal teams and customers…
remote workforce Blog
March 2, 2018

Thinking About a Remote Workforce?

How to Solve the 3 Toughest Challenges  So, you’re thinking about implementing a remote workforce? That’s smart… like, saving-thousands-of-dollars smart. With transportation and car-related expenses—on average—your employees are spending a…