Stay Current on the Ever-Changing World of IT with TCG’s Blog

February 28, 2022

Press Release: Magna5 Acquires TCG Network Services

Magna5 Continues Expansion of Managed Services Business through Acquisition of TCG Network Services PITTSBURGH, MAR 02, 2022 /PRNewswire/ — Magna5, a national provider of managed…
CyBlok Sixty Podcast Blog
August 3, 2021

CyBlok Sixty Podcast

We are proud to announce the CyBlok Sixty Podcast, our new technology and cybersecurity audio series. Our goal is to share tips, tricks, and other…
Life Sciences Researchers BioPharmaBlog
June 1, 2021

A Punch to the Gut: Are Life Sciences Companies the Next Big Cyber Target?

A Punch to the Gut Following the February 5th, 2021 water treatment plant breach in Olsmar, Florida, Cybersecurity companies like TCG began seeing a surge…
April 16, 2021

Press Release: Earth Day E-Waste Recycling Event

FOR IMMEDIATE RELEASE Contact: Jonathan Browning Marketing Director, TCG Network Services 866-824-6389   TCG Plans Major E-Waste Recycling Event for Earth Day Massachusetts-Based IT…
Accounting & FinanceBlog
April 9, 2021

Layered Security for Credit Unions: 6 Critical Components

Sutton’s Law During Willie Sutton’s 40-year career as an outlaw, he stole an estimated $40 million dollars. When they asked him why he robbed banks,…
NIST Framework Blog
March 31, 2021

Evolving Threats: The NIST Framework and Social Engineering Attacks

What is NIST? Search for the National Institute of Standards and Technology in your favorite web browser. It’s a fascinating way to spend ten minutes.…
Water Department Blog
March 10, 2021

In Hot Water: Lackluster Cybersecurity at Municipal Water Departments

What is the cost of a glass of water? Well, it depends on a lot of factors…what kind of water? Where was it sourced? Where…
February 2, 2021

No More Half-Measures: Managed Detection and Response

When a business challenge feels too big or scary, it is human nature to find shortcuts or to avoid the problem altogether. A clear example…
What is a Zero Day Threat? Blog
January 25, 2021

What’s a “Zero-Day Threat”?

Updated: January 25th, 2021 It isn’t the name of a hard rock band. Well, it might be at this point, but that’s not relevant in…
Man Sitting in Front of Laptop Computer BlogConstruction
November 17, 2020

The Top 8 Cybersecurity Threats of 2020

Updated: Nov 17th, 2020 Imagine an office building. The staff punches in at 9 AM and out at 5 PM. They take an hour for…
Warship device hidden in cardboard box BlogNon-Profit
September 22, 2020

Hackers at your Doorstep: The Threat of Warshipping

Updated: Sept 22nd, 2020 According to a recent Washington Post-ABC News poll, 90% of Americans are staying home to prevent the spread of the Coronavirus.…
Wireless Router on Computer Desk Blog
August 14, 2020

Work From Home Employees Having Slow Internet Issues?

Updated: Aug 14th, 2020 Problem: As more staff members work from home during the COVID19/Coronavirus pandemic, internet slowness / bandwidth issues can limit productivity. Potential…
Zoom Video Conferencing on Computer Monitor BlogStartup
May 1, 2020

Secure Your Zoom Accounts: 500,000 Accounts Have Already Been Compromised

Updated: May 1st, 2020 More than half a million Zoom accounts have been exposed to hackers according to research from the cybersecurity firm Cyble. Many…
Zoom Web Conference Blog
April 8, 2020

While Zoom Security Concerns Persist, Microsoft Offers Teams as a Safer Alternative

As millions of Americans explore ways to work remotely while maintaining efficiency, video conferencing has become more important than ever before. But which application is…
woman-in-blue-floral-top-sitting-while-using-laptop-806835.jpg Blog
March 24, 2020

COVID-19 Prep: Does Your IT Strategy Include Resiliency & Redundancy?

The COVID-19/Coronavirus crisis has highlighted a lack of resiliency and redundancy for many organizations. Due to the wildly unpredictable conditions we find ourselves in, IT…
March 12, 2020

The Health of Your Business: 4 Things to Consider in the Pandemic Era

The Coronavirus / COVID-19 virus has brought healthcare back to the forefront of our national conversation. As a Managed Services Provider, TCG has frequently drawn…
CyBlok Logo Image Blog
February 18, 2020

Press Release: TCG Unveils CyBlok to Meet Clients’ Cybersecurity Needs

Natick, Mass., January 28, 2020 - TCG Network Services – the Northeast’s premier Managed Services Provider – is proud to announce the launch of its latest Security Information and…
Ransomware Myths Blog
January 15, 2020

Don’t Fall for These 3 Ransomware Myths

As companies continue doing more online, business owners need to be on the lookout for hackers trying to steal their data. Over the last few…
IT Health Check BlogHealth-Medical
January 15, 2020

IT Health Check: 10 Questions to Ask Your Business In 2020!

Would you like to speak with IT professionals that can help you keep your technology resolutions in 2020? Call us at 866-TCG-NETW or contact us…
The Perils of Holiday Shopping Online @ Work Blog
December 15, 2019

The Perils of Holiday Shopping at Work

So December isn’t exactly top-of-the-charts when it comes to economic output. Americans love the holidays and according to a study by Robert Half Staffing, 52%…
December 11, 2019

Top 15 Reasons to Choose Managed IT Services Over Break/Fix

In the world of outsourced IT, there are many kinds of vendor-client relationships, but they generally fall into one of two categories: Break/Fix and Managed…
November 21, 2019

End of the Road for Windows Server 2008

What OS does your business’ server run? If you’re not sure, now is the perfect time to find out. Two market-leading products, Microsoft Windows Server…
November 1, 2019

Protect Your Business with 3 Gift Ideas

The holidays are almost here and now is the time to start thinking about what you’re going to buy for the people closest to you.…
October 16, 2019

Unsafe Email Is Just Asking For Compromise!

If you believe your email is private and secure, think again. In today’s high cyber threat world, you need as much protection as possible. With…
October 7, 2019

SMBs Pain Tolerance For Data Loss & Recovery Time?

Small to medium sized businesses need data backup and recovery as an insurance policy! Data loss can come from hardware failure, virus intrusion, accidental loss…
cybersecurity Blog
October 2, 2019

The 4 Types of Data Breaches You Need to Know

If you were hit with a data breach, would you know? It seems like a silly question, but companies take an average of more than 190…
microsoft ending support Blog
September 1, 2019

How Are You Preparing for 2020’s Microsoft End-of-Support List?

If you’re like most businesses, you’ve been seeing notifications start to surface about a daunting change to your business. Coming January 14, 2020, Microsoft® will…
August 13, 2019

Press Release: TCG Kicks Off Healthcare Month

Natick, Mass., August 13, 2019 - TCG Network Services is proud to announce that the month of August will be focused on reaching and supporting healthcare…
business continuity plan Blog
August 2, 2019

How Business Continuity Plans Differ from Disaster Recovery Plans

Nobody likes to think about worst-case scenarios when it comes to their business. Unfortunately, your company is susceptible to a wide variety of natural disasters, structure fires,…
July 16, 2019

CyBlok Product Announcement

Hackers are tenacious. They spend days, weeks, even months searching for entry into your network. Once they gain access, these criminals devote more than 200…
June 28, 2019

Can Your Business Survive a Data Disaster?

It’s not a matter of “if,” it’s a matter of “when” your company will face a data disaster. These data disasters can come in many…
June 12, 2019

The Data Compliance Cheat Sheet

If you had to list your company’s assets, a lot of tangible things come to mind. What about data? It may not occur to you that the most valuable things you…
June 3, 2019

The ABCs of IT Compliance

From A to Z, a great business leader knows their industry and the standards that it is held to. But with everchanging IT solutions to…
May 13, 2019

Press Release: TCG Announces Promotion of New Marketing Director

Natick, Mass., May 13th, 2019 - TCG Network Services is pleased to announce the promotion of Jonathan Browning to the position of Marketing Director. In…
May 13, 2019

Press Release: TCG Sponsors Information Technology Security Summit

Natick, Mass., May 13th, 2019 - TCG Network Services announces their Silver Sponsorship of the 7th Annual Information Technology Security Summit, which they’ve done each…
May 3, 2019

5 Tools to Improve Project Management

A study by Hive found that 77 percent of high-performing projects use project management (PM) software. Considering that fact, it’s a surprise that a survey…
April 1, 2019

3 Reasons Your Business Needs a vCIO

“Should I let my employees use their personal devices for work?”  “Will this new solution be a game-changer or a waste of my money?”  “How do I…
March 8, 2019

Finding the Right Cloud-Based Collaboration Tool for Your Business

The cloud hosts hundreds of tools and applications designed to improve security and collaboration, streamline operations and project management, and enhance your existing solutions. But,…
February 1, 2019

4 Ways to Meet Compliance with Innovative Cloud Technologies

According to IDC, no less than 60 percent of all IT spending and up to 70 percent of all software, services and tech spending will…
January 1, 2019

Your Guide to Ethics & Privacy

In his 2009 paper Digital Ethics, Richard Capurro described digital ethics as, “the impact of digital Information and Communication Technologies (ICT) on our societies and…
December 1, 2018

5 Questions You Should be Asking Before the New Year

When it comes to enhancing the way you do business, you’ve probably got a lot of questions. From implementing new solutions to boosting your existing services, deciding…
November 1, 2018

Brilliant Tech Gifts for Home, Work and Play

As you consider holiday gifts for all the people who make your business a success – your employees, customers and partners – answer these three…
October 1, 2018

Out With the Old, In With the New – Upgrade Your Tech with Section 179

When new employees join your business, are they saddled with hand-me-down technology that’s seen better days? If you’ve tried to save money by stretching your…
Plane Flying into Logan Airport Blog
September 21, 2018

Safe Travels: Cybersecurity on the Road 

You’re traveling for business tomorrow. You packed your bag. Bought your tickets. Booked the hotel. You even remembered to turn on the voicemail away message.…
vCIO Virtual CIO Blog
September 1, 2018

Does Your Company Need a vCIO? Take Our Self-Assessment

If you’ve never heard of a virtual CIO, you probably assume you don’t need one. But, virtual CIOs, or vCIOs, give companies the benefit of…
Cybersecurity Secure Password Blog
August 20, 2018

Eight Ways to Prevent Data Theft

Here are 8 steps that small and mid-sized businesses can take to prevent data theft:   Updates matter Unpatched computers, routers, servers, and other internet-connected…
IoT Internet of Things Blog
August 1, 2018

How to Integrate IoT into Your Business: A Checklist for Getting Started

The Internet of Things (IoT) is impacting thousands of businesses every day, from connecting endpoints – like mobile devices, televisions and security systems – to…
#TCGmoves to new Natick office Blog
July 30, 2018

Press Release: TCG Plans Move to New Natick Office Building

Massachusetts-based IT Service Provider Transitions to Larger Location Within the MetroWest Community NATICK, Mass., July 30, 2018 ( - TCG Network Services – the Northeast’s premier Managed…
Social Engineering Red flags Blog
July 25, 2018

Social Engineering Red Flags

Want to download the PDF version? Click here.
AllWorx and TCG Network Services are partnering to offer Educational institutions discounts on VoIP phones. Blog
July 23, 2018

Allworx Educational Sales Promotion

Want to download the PDF version? Click here.  
What is GDPR and how does it affect my small business? Blog
July 11, 2018

Ready to hit the GDPR panic button?

Want to download the PDF version? Click here.  
Small Businesses can be bankrupted by unforeseen tragedies. Partnering with TCG can prevent the worst. Blog
July 1, 2018

5 Catastrophes that Made IT Disaster Recovery Critical in 2017

“Disasters don’t happen here.” That kind of thinking can be tempting when you’re deciding what IT recovery plan to include in your budget. But the…
How can Cisco Meraki hardware improve your small business? Blog
June 27, 2018

Cisco Meraki: The Cloud Managed IT Advantage

Maintaining network infrastructure is really challenging for most small and mid-sized businesses. The reason? Things are always changing. Employees come and go. Devices are purchased,…
VoIP, phone, service, TCG Network Services Blog
June 20, 2018

Six Reasons to Switch: Find Your Company’s Voice with VoIP

When we mention to clients that we offer the best-in-class VoIP telephone system MaxCS by AltiGen Communications, one of the first questions we get is,…
cloud, services, email, skype, microsoft, azure, myths Blog
May 30, 2018

Five Myths About the Cloud – Debunked!

It’s human nature to be wary of something new, something different – something that seems too good to be true. Especially when it comes to…
office 365 blog Blog
May 2, 2018

What? You’re Not Using Office 365? If You’re In The Weeds, We Can Help

Chances are that your competition is already using the Microsoft Office 365 suite of tools to maximize their productivity and grow their business, so why…
unified communications blog Blog
April 2, 2018

Streamline Your Team’s Collaboration

5 Ways Unified Communications Helps Unified communications (UC) integrates instant messaging, presence information, voice, mobility, audio, web and more services to make the communication process…
remote workforce Blog
March 2, 2018

Thinking About a Remote Workforce?

How to Solve the 3 Toughest Challenges  So, you’re thinking about implementing a remote workforce? That’s smart… like, saving-thousands-of-dollars smart. With transportation and car-related expenses—on…