PCS Blog

PCS has been serving the Knoxville area since 1996, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Windows 7 and Windows Server 2008 R2 is Losing Support

Windows 7 and Windows Server 2008 R2 is Losing Support

Microsoft Windows has been a staple of modern computing, with each title in the series offering more innovative features. When it comes time to retire one of their operating systems, it can be troublesome for businesses. This coming January, two of the most utilized versions of the Windows OS - Windows 7 and Windows Server 2008 R2 - will be losing support, effectively ending their viability. Businesses that still use these will have to come up with a plan for how they are going to proceed once Microsoft retires that software. 

0 Comments
Continue reading

Even Small Businesses Are Targets for Hackers

Even Small Businesses Are Targets for Hackers

Do you ever think of your business as too small of a target to matter to hackers? Some organizations actually do believe this, and that notion is effectively a trap. The thing that all businesses need to keep in mind is that all companies, regardless of which industry they fall into, have data that’s valuable to hackers. 

0 Comments
Continue reading

Staff Education Goes a Long Way in Preventing Security Issues

Staff Education Goes a Long Way in Preventing Security Issues

In a perfect world, keeping your antivirus updated and having a good firewall in place would be enough to protect your business from cybersecurity threats.

Unfortunately, most attacks still come in through email and can slip by your users. Even the most complex cybersecurity platforms used by massive corporations and governments can be foiled by a simple phishing attack, and your end-users are your last line of defense.

0 Comments
Continue reading

Why a Wireless Network Design is Necessary in K-12

education-section

In the past few years, the needs of a wireless network have evolved greatly. Early on, access to a wireless network at a school was a convenience that allowed a handful of mobile devices access to the internet. With the lack of mobile devices and the financial investment made on wired computer labs, the wireless network was far from mission critical. Today, other than sports stadiums and some hospitals, schools have the highest client density and some of the most demanding wireless needs of any user group. Schools now have a wireless device, typically a laptop or tablet, for every student and teacher in the district. The wireless network must also sometimes support a wide range of cell phones and other random devices such as printers, A/V equipment, and other devices of varying wireless capabilities. With the influx of wireless devices, the thought process in which a wireless network was designed also had to shift from providing coverage designs to engineering capacity designs.

Continue reading

Taking an Exploratory Stab at Spear Phishing

Taking an Exploratory Stab at Spear Phishing

Chances are, you’ve heard of “phishing” - a cybercriminal’s scam that steals data, access credentials, and other sensitive information by fooling a user into thinking they are providing this information to someone who is supposed to have access to it. However, there are a few different kinds of phishing, based on how it is carried out. Here, we’ll discuss the realities of spear phishing, and the risks it poses to your business.

0 Comments
Continue reading

An Outdated Operating System Poses a Huge Security Risk

Windows_7

It’s time to abandon Windows 7 for a safer option. Windows 7 is considered to be one of Microsoft's most successful operating systems. So much so that many organizations skipped upgrading to either of Microsoft’s newer operating systems - Windows 8 and Windows 10. You may be able to list many reasons why you want to stay with Windows 7, but it is time to start preparing to upgrade away from the OS as the end of life deadline is fast approaching.

Continue reading

Do Your Potential Clients Know What It Looks Like to Work With You?

pcs-proven-process-web

While we all have a series of steps we generally follow each time we partner with someone to provide products or services, we often don’t document them or tell our clients (or prospective ones) what those steps are.

There is credibility in an established, consistent process that is consistently followed. It ensures that steps aren’t missed and that nothing falls through the cracks.

Continue reading

Tip of the Week: Your Phone Can Work as Your Security Key

Tip of the Week: Your Phone Can Work as Your Security Key

If you’re like most people nowadays, your mobile phone is currently well within your reach (and that’s assuming you aren’t reading this blog on it). The fact that most people keep their phone on them at all times has greatly contributed to these devices becoming a part of any given work-related process. One major way is the implementation of two-factor authentication, which we’ll discuss as a part of this week’s tip.

0 Comments
Continue reading

What You Need to Consider About BYOD

What You Need to Consider About BYOD

One of the biggest buzzwords in business these days is BYOD - Bring Your Own Device - and for good reason. There are plenty of operational benefits that an organization can enjoy by adopting a BYOD policy, but BYOD isn’t an inherently perfect solution, which means that businesses that leverage it need to do so mindfully.

0 Comments
Continue reading

Trust the Process

trust-the-process

Hi, my name is Ryan, and I’m a brain surgeon and here to work on your sink. Well, not really – wouldn’t that be odd? Or what would be even worse – a plumber claiming he can perform brain surgery! That’s a scenario in which I would have to politely decline. Oddly enough though, I see a similar story unfold rather frequently, even in the IT world.

Have you ever met with that sales professional that spent 30 minutes promising you the world, but never asked a single question about your business? It was all about how great they are, how great their company is, and how great their product is. Great for who exactly? They don’t know you, they don’t know your company, and more importantly they don’t know what you need. They haven’t given you the opportunity to speak up and tell them. So, I started this post off with introducing myself as a brain surgeon but, obviously, I’m not a doctor. I’ll start over…

Continue reading

A Story of Caution

caution

A couple of months ago, I shared some content on LinkedIn. It was something that Gary Vaynerchuk had posted. I have been listening and reading his content off and on for the last 7 or so years. What happened next was really unexpected. Within a couple of minutes of sharing that post, I was sent an invitation to connect. I thought this was really exciting that someone I had been following for so long had wanted to personally connect. Next, he sent me a message via LinkedIn. I started down a conversation that was pretty involved and well played. Spoiler, it wasn’t Gary V.

Continue reading

Tip of the Week: How to Speed Up a Slow Windows 10 Device

Tip of the Week: How to Speed Up a Slow Windows 10 Device

Windows 10 is a remarkable tool. Having said this, it can sometimes seem to slow to a crawl… not the ideal situation when you’re trying to be productive. That’s why we’re devoting this week’s tip to speeding up Windows 10.

0 Comments
Continue reading

Getting to Know About Phishing Attacks Can Keep Your Business Safe

Getting to Know About Phishing Attacks Can Keep Your Business Safe

There’s a big reason why phishing is a primary threat to businesses, and it’s because this method gives hackers a relatively risk-free way of gaining access to a network or other resources. Even being aware of the issue is often not enough to prevent it, as hackers are known to get quite aggressive and crafty with their phishing campaigns. If only a fraction of the 57 billion phishing emails that go out every year are taken seriously, hackers make quite a bit of profit off of users.

0 Comments
Continue reading

No Phishing Allowed

morton-no-phishing

Recently I came across an online plea for help from someone who fell prey to a phishing scam. He said someone claiming to be the company CEO sent him an email asking him to buy Google Play gift cards for a bonus and then send him the details. He was out sick that day, the CEO is off-site a lot, and he didn’t suspect this was a scam. He bought the cards and sent the scammer all the details. It wasn’t until the scammer asked for a second batch of cards that he realized it might not be the CEO. At that point he called the office only to discover it had been a scam all along.

Continue reading

When It Is Too Late…

Most business owners and leaders are aware of the potential catastrophic loss of everything from a physical stand point. However, over the 24 years I have worked in IT, the non-tangible loss is rarely considered, until it is too late.  

Recently, we have started working with several new clients, after it has been too late. It genuinely pains me to see a business lose everything they have worked so hard to build, knowing it could have been easily prevented. It is not always a building fire, hardware failure, theft, or something physically catastrophic that leads to loss. With the ever-changing landscape in technology, viruses and hackers have been bringing businesses to their knees.  

Continue reading

Tip of the Week: 4 Tech Questions, Answered

Tip of the Week: 4 Tech Questions, Answered

Have you ever thought about why we use certain techniques to get the most out of our technology? Believe it or not, there is often a rhyme and a reason for why certain tactics are most useful for business technology solutions. We’ll try to get to the bottom of some of the strangest questions you might have about how to use your business technology.

0 Comments
Continue reading

Focus Your Technology on Producing Efficiency

Focus Your Technology on Producing Efficiency

Technology can go a long way toward helping businesses be more productive with their time, but only if the solutions implemented are right and proper for your organization. We’ll discuss three services that you can provide for your business that can maximize productivity with technology solutions.

0 Comments
Continue reading

Top Cybersecurity Threats Right Now

Top Cybersecurity Threats Right Now

Cybersecurity has to be a major consideration for every business owner or manager in business today. The prevalence of people looking to rip your company off has never been higher, and that is the truth for nearly every company that uses the internet for anything. Today, we take a look at some of the most serious cybersecurity threats that everyone should be aware of right now.

0 Comments
Continue reading

Job Opportunity - Level III Network Operations Center Engineer

images

Position Summary:  This position requires communicating with clients and following appropriate processes and procedures in order to resolve the client’s technical issues. The person in this position helps the network operations center to achieve success and our clients to achieve satisfaction with our service. The person in this position will work with Project Managers, Account Executives, Inside Account Managers, and Senior Technical Project Engineers to deliver positive and profitable client experiences.

PCS has been serving Knoxville and surrounding areas since 1996, providing an array of IT products and services such as networking, interactive technologies, security, and flat rate IT to businesses and schools across the state. At PCS we value our employees, and we are always looking for talented new people to join our team!

Continue reading

Job Opportunity - Level II Network Operations Center Engineer

image_20190108-173639_1

Position Summary:  This position requires communicating with clients and following appropriate processes and procedures in order to resolve the client’s technical issues. The person in this position helps the network operations center to achieve success and our clients to achieve satisfaction with our service. The person in this position will work with Project Managers, Account Executives, Inside Account Managers, and Senior Technical Project Engineers to deliver positive and profitable client experiences.

PCS has been serving Knoxville and surrounding areas since 1996, providing an array of IT products and services such as networking, interactive technologies, security, and flat rate IT to businesses and schools across the state. At PCS we value our employees, and we are always looking for talented new people to join our team!

Continue reading