Roger is responsible for all TSI’s Marketing & Communications. He graduated with a Bachelor's in Marketing from the University of Massachusetts Amherst with Honors. He joins us with a vast amount of marketing experience, spanning 13 years in licensed branding for global consumer brands, as well as managing operations within the pharmaceutical healthcare sector.
Today, he is responsible for implementing our marketing initiatives, managing our campaigns, as well as cultivating our social media and client communications. He focuses his efforts on providing content that our clients find of interest, including technology trends, or the latest security vulnerabilities from our trusted internal experts.
Hilton Hotels reached a settlement this month with New York Attorney General Eric T. Schneiderman and Vermont Attorney General TJ Donovan following two breaches in 2015. The settlement totaled $700,000
Whether you are moving to the cloud, refreshing equipment, moving offices and/or data centers, or simply cleaning house, properly discarding of old machines can be a tough task. The complexity of decommissioning IT assets only becomes more of a burden when you’re working in a highly regulated industry sector.
In a report conducted by Osterman Research and sponsored by Malwarebytes, more than 1,000 small and medium-sized businesses were surveyed in June 2017 about ransomware and other critical security issues. What we discovered was surprising—ransomware authors aren’t only targeting enterprise businesses for big payouts. They’ve got their greedy gaze on businesses of all sizes. In … Continued
Data breaches are running 29% above last year, according to a report released by the Identity Theft Resource Center and Cyberscout. Hacking was the leading cause of data breaches nationwide, more than 790 so far this year. More than 12 million records have been exposed, although two-thirds of data breach notifications or public notices did … Continued
Did you know there are over 8,500 different Local, State, and Federal standards & requirements your organization may be required to comply with? This staggering number can come as a surprise to many. That’s why we’ve taken the time to compile a list of the most common standards which may require your organization to implement … Continued
Privacy…we all talk about it and we’re all concerned with losing it, but does it really matter? There are 1.94 billion active monthly Facebook users, 3.5 billion daily Google searches, and over 95 million photos & videos shared on Instagram each day. These are a few examples of the many apps, fun quizzes & surveys, … Continued
We live in a tech-driven world; whether in the office, at home, the car, or even in sky, the convenience and access to vast amounts of information is always a fingertip away. If you ignore innovation, you risk rendering yourself obsolete. However, when you’re responsible for making technology investment decisions for an entire organization, being … Continued
Blockchain is one of the hottest technologies right now. Its being marketed as one of the most secure database technologies for data-storage & file-sharing available. Blockchain skyrocketed to notoriety after its technology being used to protect Bitcoin. Nowadays, you’ll find that Blockchain has moved far beyond just cryptocurrency exchange. In fact, it has garnered the … Continued
Network Infiltration and Data Breaches are normally blamed on the malicious outsider. However, the responsibility for most organizations network security is with their employees, who unwittingly open the door welcoming cybercriminals into your environment. That’s why it’s crucial to properly educate your employees about Cybersecurity. When you provide routine training as a preventative, not reactive, … Continued
Microsoft Azure is a cloud computing platform, among many functionalities Azure delivers solid recovery and replication services to ensure business continuity. But before implementing Azure for your organization, we recommend a few simple tips to making the process that much smoother… Develop an Implementation Roadmap When it comes to implementing a new cloud computing platform … Continued