Stay Current on the Ever-Changing World of IT with TCG’s Blog

March 16, 2022

ICMC Webinar: Boston Marathon Bombing Lessons for Incident Response and Business Continuity

TCG/Magna5 Boston's Director of Cybersecurity, John Petrozzelli, will make an exclusive appearance…
March 2, 2022

Press Release: Magna5 Acquires TCG Network Services

Magna5 Continues Expansion of Managed Services Business through Acquisition of TCG Network…
Ransomware 3.0 Attackers Go All-In BlogUncategorized
February 8, 2022

Ransomware 3.0: Cybercriminals Go ‘All-In’ to Steal

INTRO We’re one full month into 2022 and one thing is clear:…
Windows 11 Logo BlogUncategorized
January 10, 2022

The Clock is Ticking: Are Your Computers Upgradeable to Windows 11?

INTRO In October 2025, Windows 10 will reach its End of Life.…
Server Connections BlogUncategorized
November 1, 2021

Three Ways a Rack Refresh can Pour Thousands of Dollars Back into your IT Budget

#1 Eliminating redundant equipment reduces maintenance and vendor costs #2 Streamlining the…
IT Director for a Marketing Firm Blog
October 22, 2021

Four Steps New IT Directors can take to Increase Job Security

#1 Slow Down #2 Assess and Consult #3 Delegate #4 Demonstrate Progress…
Director of Cybersecurity John Petrozzelli Blog
September 16, 2021

Press Release: TCG Announces New Director of Cybersecurity

TCG Announces Hiring of New Director of Cybersecurity NATICK, Mass., September 16th,…
CyBlok Sixty Podcast Blog
September 15, 2021

CyBlok Sixty Podcast

We are proud to announce the CyBlok Sixty Podcast, our new technology…
Life Sciences Researchers BioPharmaBlog
June 1, 2021

A Punch to the Gut: Are Life Sciences Companies the Next Big Cyber Target?

A Punch to the Gut Following the February 5th, 2021 water treatment…
April 16, 2021

Press Release: Earth Day E-Waste Recycling Event

TCG Announces E-Waste Recycling Event NATICK, Mass., April 16th, 2021 - The Northeast’s…
Accounting & FinanceBlog
April 9, 2021

Layered Security for Credit Unions: 6 Critical Components

Sutton’s Law During Willie Sutton’s 40-year career as an outlaw, he stole…
NIST Framework Blog
March 31, 2021

Evolving Threats: The NIST Framework and Social Engineering Attacks

What is NIST? Search for the National Institute of Standards and Technology…
Water Department Blog
March 10, 2021

In Hot Water: Lackluster Cybersecurity at Municipal Water Departments

What is the cost of a glass of water? Well, it depends…
February 2, 2021

No More Half-Measures: Managed Detection and Response

When a business challenge feels too big or scary, it is human…
What is a Zero Day Threat? Blog
January 25, 2021

What’s a “Zero-Day Threat”?

Updated: January 25th, 2021 It isn’t the name of a hard rock…
Man Sitting in Front of Laptop Computer BlogConstruction
November 17, 2020

The Top 8 Cybersecurity Threats of 2020

Updated: Nov 17th, 2020 Imagine an office building. The staff punches in…
Warship device hidden in cardboard box BlogNon-Profit
September 22, 2020

Hackers at your Doorstep: The Threat of Warshipping

Updated: Sept 22nd, 2020 According to a recent Washington Post-ABC News poll,…
Wireless Router on Computer Desk Blog
August 14, 2020

Work From Home Employees Having Slow Internet Issues?

Updated: Aug 14th, 2020 Problem: As more staff members work from home…
Zoom Video Conferencing on Computer Monitor BlogStartup
May 1, 2020

Secure Your Zoom Accounts: 500,000 Accounts Have Already Been Compromised

Updated: May 1st, 2020 More than half a million Zoom accounts have…
Zoom Web Conference Blog
April 8, 2020

While Zoom Security Concerns Persist, Microsoft Offers Teams as a Safer Alternative

As millions of Americans explore ways to work remotely while maintaining efficiency,…
woman-in-blue-floral-top-sitting-while-using-laptop-806835.jpg Blog
March 24, 2020

COVID-19 Prep: Does Your IT Strategy Include Resiliency & Redundancy?

The COVID-19/Coronavirus crisis has highlighted a lack of resiliency and redundancy for…
March 12, 2020

The Health of Your Business: 4 Things to Consider in the Pandemic Era

The Coronavirus / COVID-19 virus has brought healthcare back to the forefront…
CyBlok Logo Image Blog
February 18, 2020

Press Release: TCG Unveils CyBlok to Meet Clients’ Cybersecurity Needs

TCG Unveils New CyBlok Cybersecurity Platform NATICK, Mass., January 28, 2020 - TCG…
Ransomware Myths Blog
January 15, 2020

Don’t Fall for These 3 Ransomware Myths

As companies continue doing more online, business owners need to be on…
IT Health Check BlogHealth-Medical
January 15, 2020

IT Health Check: 10 Questions to Ask Your Business In 2020!

Would you like to speak with IT professionals that can help you…
The Perils of Holiday Shopping Online @ Work Blog
December 15, 2019

The Perils of Holiday Shopping at Work

So December isn’t exactly top-of-the-charts when it comes to economic output. Americans…
December 11, 2019

Top 15 Reasons to Choose Managed IT Services Over Break/Fix

In the world of outsourced IT, there are many kinds of vendor-client…
November 21, 2019

End of the Road for Windows Server 2008

What OS does your business’ server run? If you’re not sure, now…
November 1, 2019

Protect Your Business with 3 Gift Ideas

The holidays are almost here and now is the time to start…
October 16, 2019

Unsafe Email Is Just Asking For Compromise!

If you believe your email is private and secure, think again. In…
October 7, 2019

SMBs Pain Tolerance For Data Loss & Recovery Time?

Small to medium sized businesses need data backup and recovery as an…
cybersecurity Blog
October 2, 2019

The 4 Types of Data Breaches You Need to Know

If you were hit with a data breach, would you know? It…
microsoft ending support Blog
September 1, 2019

How Are You Preparing for 2020’s Microsoft End-of-Support List?

If you’re like most businesses, you’ve been seeing notifications start to surface…
August 13, 2019

Press Release: TCG Kicks Off Healthcare Month

TCG Kicks Off Healthcare Month NATICK, Mass., August 13, 2019 - TCG…
business continuity plan Blog
August 2, 2019

How Business Continuity Plans Differ from Disaster Recovery Plans

Nobody likes to think about worst-case scenarios when it comes to their business. Unfortunately,…
July 16, 2019

CyBlok Product Announcement

Hackers are tenacious. They spend days, weeks, even months searching for entry…
June 28, 2019

Can Your Business Survive a Data Disaster?

It’s not a matter of “if,” it’s a matter of “when” your…
June 12, 2019

The Data Compliance Cheat Sheet

If you had to list your company’s assets, a lot of tangible things come to mind.…
June 3, 2019

The ABCs of IT Compliance

From A to Z, a great business leader knows their industry and…
May 13, 2019

Press Release: TCG Announces Promotion of New Marketing Director

TCG Promotes New Marketing Director Role NATICK, Mass., May 13th, 2019 -…
May 13, 2019

Press Release: TCG Sponsors Information Technology Security Summit

TCG Sponsors Information Technology Security Summit NATICK, Mass., May 13th, 2019 -…
May 3, 2019

5 Tools to Improve Project Management

A study by Hive found that 77 percent of high-performing projects use…
April 1, 2019

3 Reasons Your Business Needs a vCIO

“Should I let my employees use their personal devices for work?”  “Will…
March 8, 2019

Finding the Right Cloud-Based Collaboration Tool for Your Business

The cloud hosts hundreds of tools and applications designed to improve security…
February 1, 2019

4 Ways to Meet Compliance with Innovative Cloud Technologies

According to IDC, no less than 60 percent of all IT spending…
January 1, 2019

Your Guide to Ethics & Privacy

In his 2009 paper Digital Ethics, Richard Capurro described digital ethics as,…
December 1, 2018

5 Questions You Should be Asking Before the New Year

When it comes to enhancing the way you do business, you’ve probably got…
November 1, 2018

Brilliant Tech Gifts for Home, Work and Play

As you consider holiday gifts for all the people who make your…
October 1, 2018

Out With the Old, In With the New – Upgrade Your Tech with Section 179

When new employees join your business, are they saddled with hand-me-down technology…
Plane Flying into Logan Airport Blog
September 21, 2018

Safe Travels: Cybersecurity on the Road 

You’re traveling for business tomorrow. You packed your bag. Bought your tickets.…
vCIO Virtual CIO Blog
September 1, 2018

Does Your Company Need a vCIO? Take Our Self-Assessment

If you’ve never heard of a virtual CIO, you probably assume you…
Cybersecurity Secure Password Blog
August 20, 2018

Eight Ways to Prevent Data Theft

Here are 8 steps that small and mid-sized businesses can take to…
IoT Internet of Things Blog
August 1, 2018

How to Integrate IoT into Your Business: A Checklist for Getting Started

The Internet of Things (IoT) is impacting thousands of businesses every day,…
#TCGmoves to new Natick office Blog
July 30, 2018

Press Release: TCG Plans Move to New Natick Office Building

TCG Plans Move to New Natick Office Building NATICK, Mass., July 30,…
Social Engineering Red flags Blog
July 25, 2018

Social Engineering Red Flags

Want to download the PDF version? Click here.
AllWorx and TCG Network Services are partnering to offer Educational institutions discounts on VoIP phones. Blog
July 23, 2018

Allworx Educational Sales Promotion

Want to download the PDF version? Click here.  
What is GDPR and how does it affect my small business? Blog
July 11, 2018

Ready to hit the GDPR panic button?

Want to download the PDF version? Click here.  
Small Businesses can be bankrupted by unforeseen tragedies. Partnering with TCG can prevent the worst. Blog
July 1, 2018

5 Catastrophes that Made IT Disaster Recovery Critical in 2017

“Disasters don’t happen here.” That kind of thinking can be tempting when…
How can Cisco Meraki hardware improve your small business? Blog
June 27, 2018

Cisco Meraki: The Cloud Managed IT Advantage

Maintaining network infrastructure is really challenging for most small and mid-sized businesses.…
VoIP, phone, service, TCG Network Services Blog
June 20, 2018

Six Reasons to Switch: Find Your Company’s Voice with VoIP

When we mention to clients that we offer the best-in-class VoIP telephone…
cloud, services, email, skype, microsoft, azure, myths Blog
May 30, 2018

Five Myths About the Cloud – Debunked!

It’s human nature to be wary of something new, something different –…
office 365 blog Blog
May 2, 2018

What? You’re Not Using Office 365? If You’re In The Weeds, We Can Help

Chances are that your competition is already using the Microsoft Office 365…
unified communications blog Blog
April 2, 2018

Streamline Your Team’s Collaboration

5 Ways Unified Communications Helps Unified communications (UC) integrates instant messaging, presence…
remote workforce Blog
March 2, 2018

Thinking About a Remote Workforce?

How to Solve the 3 Toughest Challenges  So, you’re thinking about implementing…