Blog Library
Library of information-filled blogs written by PCA contributors.

Cloud Token Theft: How to Detect and Prevent Attacks
Imagine this: You log into your cloud account as usual, but unknown to you, a cybercriminal has already stolen your authentication token. They now have the same access you do, without needing your password. Scary right? This is the reality of token theft, a rising...
Latest Blogs
Protecting Against Cyber Threats in the Construction Industry
Most of us do not immediately consider cyberattacks as being an issue when we think of the construction industry. Like practically all businesses today, construction companies use computers, software, handheld devices and keep data in the cloud, which makes them vulnerable to cyber threats.
The Jeff Crilley Show with Ted Clouser and Justin Lloyd
PCA Technology Solutions’ CEO, Ted Clouser, and Business Solutions Manager, Justin Lloyd, were invited to be on The Jeff Crilley Show to discuss how PCA has made a name for itself in the tech world.
Securing Your Business: Choosing The Right Type of Backup
With various backup options available, choosing the right one can be overwhelming. Full, incremental, or differential, and on-site versus cloud – what is best for your business?
A Journey of Heart
During a particularly distressing episode, at his wife’s suggestion, Steve reluctantly agreed to go to the Arkansas Heart Hospital. To his surprise, within 30 minutes of arriving, a life-threatening magnesium deficiency was identified – a condition that had gone unnoticed despite years of medical examinations.
How to Choose the Best Remote Access Option
Two technologies have become commonplace in our discussions of remote access, though many don’t know anything about them beyond their acronyms: RDP and VPN.
Connecting Your Business: Choosing the Right Internet Option
In today’s digital landscape, a reliable and robust internet connection is no longer a luxury for businesses. We discuss the variety of internet options available.