PCS Blog

PCS has been serving the Knoxville area since 1996, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Windows 7 and Windows Server 2008 R2 is Losing Support

Windows 7 and Windows Server 2008 R2 is Losing Support

Microsoft Windows has been a staple of modern computing, with each title in the series offering more innovative features. When it comes time to retire one of their operating systems, it can be troublesome for businesses. This coming January, two of the most utilized versions of the Windows OS - Windows 7 and Windows Server 2008 R2 - will be losing support, effectively ending their viability. Businesses that still use these will have to come up with a plan for how they are going to proceed once Microsoft retires that software. 

0 Comments
Continue reading

Even Small Businesses Are Targets for Hackers

Even Small Businesses Are Targets for Hackers

Do you ever think of your business as too small of a target to matter to hackers? Some organizations actually do believe this, and that notion is effectively a trap. The thing that all businesses need to keep in mind is that all companies, regardless of which industry they fall into, have data that’s valuable to hackers. 

0 Comments
Continue reading

Staff Education Goes a Long Way in Preventing Security Issues

Staff Education Goes a Long Way in Preventing Security Issues

In a perfect world, keeping your antivirus updated and having a good firewall in place would be enough to protect your business from cybersecurity threats.

Unfortunately, most attacks still come in through email and can slip by your users. Even the most complex cybersecurity platforms used by massive corporations and governments can be foiled by a simple phishing attack, and your end-users are your last line of defense.

0 Comments
Continue reading

Why a Wireless Network Design is Necessary in K-12

education-section

In the past few years, the needs of a wireless network have evolved greatly. Early on, access to a wireless network at a school was a convenience that allowed a handful of mobile devices access to the internet. With the lack of mobile devices and the financial investment made on wired computer labs, the wireless network was far from mission critical. Today, other than sports stadiums and some hospitals, schools have the highest client density and some of the most demanding wireless needs of any user group. Schools now have a wireless device, typically a laptop or tablet, for every student and teacher in the district. The wireless network must also sometimes support a wide range of cell phones and other random devices such as printers, A/V equipment, and other devices of varying wireless capabilities. With the influx of wireless devices, the thought process in which a wireless network was designed also had to shift from providing coverage designs to engineering capacity designs.

Continue reading

Taking an Exploratory Stab at Spear Phishing

Taking an Exploratory Stab at Spear Phishing

Chances are, you’ve heard of “phishing” - a cybercriminal’s scam that steals data, access credentials, and other sensitive information by fooling a user into thinking they are providing this information to someone who is supposed to have access to it. However, there are a few different kinds of phishing, based on how it is carried out. Here, we’ll discuss the realities of spear phishing, and the risks it poses to your business.

0 Comments
Continue reading