Roger Murray

Marketing & Communications

Roger is responsible for all of TSI’s Marketing & Communications. He graduated with a Bachelor's in Marketing from the University of Massachusetts Amherst with Honors. He joins us with a vast amount of marketing experience, spanning 13 years in licensed branding for global consumer brands, as well as managing operations within the pharmaceutical healthcare sector.

Today, he is responsible for implementing our marketing initiatives, managing our campaigns, as well as cultivating our social media and client communications. He focuses his efforts on providing content that our clients find of interest, including technology trends, or the latest security vulnerabilities from our trusted internal experts.

Roger Murray Stories

What You Need to Know About GDPR Compliance

By Roger Murray | April 4th, 2018 | Governance & IT Compliance

The General Data Protection Regulation (GDPR) is a regulation requiring businesses to protect the personal data and privacy of European Union (EU) citizens for transactions that occur within EU member states. Every company conducting business within the EU will need to comply to these strict new rules by May 25th which will likely cause concerns and heightened expectations for security teams due to the broad, yet stringent nature of the GDPR requirements.

New PCI Compliance Standards Deadline Approaching

By Roger Murray | January 30th, 2018 | Project & Contracted Services

The Payment Card Industry Security Standards Council (PCI SSC) has published a new version of the industry standard that businesses use to safeguard payment data before, during, and after purchase.  PCI Data Security Standard (PCI DSS) version 3.2 replaces previous versions in addressing the growing threats to customer payment information.

Infected USB Drives Handed Out at Data Security Event

By Roger Murray | January 19th, 2018 | Network Security

During a recent data security expo hosted by Taiwan’s Presidential Office, 54 malware-infested thumb drives were handed out to the public by the Criminal Investigation Bureau. These infected USB sticks were among the 250 drives the bureau gave to winners of a game about cybersecurity knowledge at their exhibit.

Unusual Ransomware Strain Encrypts Cloud Email In Real-Time

By Roger Murray | January 16th, 2018 | Network Security

A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time.  A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure. 

Top 25 Most Popular Passwords of 2017

By Roger Murray | December 27th, 2017 | Network Security

Each year, researchers from SplashData revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year.  Despite the continued warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information.

Hilton Data Breach Results in $700,000 Penalty

By Roger Murray | November 13th, 2017 | Governance & IT Compliance

Hilton Hotels reached a settlement this month with New York Attorney General Eric T. Schneiderman and Vermont Attorney General TJ Donovan following two breaches in 2015. The settlement totaled $700,000

7 Ways to Properly Dispose or Decommission Old Technology

By Roger Murray | November 8th, 2017 | Business Operations

Whether you are moving to the cloud, refreshing equipment, moving offices and/or data centers, or simply cleaning house, properly discarding of old machines can be a tough task.  The complexity of decommissioning IT assets only becomes more of a burden when you’re working in a highly regulated industry sector.

The Current State of Ransomware Among SMBs

By Roger Murray | August 1st, 2017 | Network Security

In a report conducted by Osterman Research and sponsored by Malwarebytes, more than 1,000 small and medium-sized businesses were surveyed in June 2017 about ransomware and other critical security issues. What we discovered was surprising—ransomware authors aren’t only targeting enterprise businesses for big payouts. They’ve got their greedy gaze on businesses of all sizes. In … Continued

Data Breaches Up 29 Percent Over Last Year

By Roger Murray | July 26th, 2017 | Network Security

Data breaches are running 29% above last year, according to a report released by the Identity Theft Resource Center and Cyberscout.  Hacking was the leading cause of data breaches nationwide, more than 790 so far this year. More than 12 million records have been exposed, although two-thirds of data breach notifications or public notices did … Continued

Security Awareness Training & Compliance Requirements

By Roger Murray | July 13th, 2017 | Governance & IT Compliance

Did you know there are over 8,500 different Local, State, and Federal standards & requirements your organization may be required to comply with? This staggering number can come as a surprise to many. That’s why we’ve taken the time to compile a list of the most common standards which may require your organization to implement … Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979