ISO 27001 – Why, What is it, and How to Get Started

By Jeremy Louise | May 23rd, 2019 | Business Operations Governance & IT Compliance

This article was written with contributions from Timonthy Woodcome, director of NQA, a leading Global Certifications Body as well as the technical staff here at Technical Support International. Also officially known as ISO/IEC 27001:2013, ISO 27001 is a specification for a set of policies and procedures that outlines all of the legal, physical and even … Continued

Your Firewall Doesn’t Work the Way You Think It Does. An Introduction to Log Monitoring and Auditing

By Jeremy Louise | May 8th, 2019 | Business Operations Governance & IT Compliance

As part of my role at TSI, I meet with a wide range of different businesses. More often than not, when I ask about their current log monitoring efforts, people aren’t even sure what this really does, and are surprised to find how unequipped they’re cyber security strategy is. In this piece, I’d like to … Continued

Congress Revisits IoT Legislation: What You Need to Know

By Chris Souza | April 18th, 2019 | Business Operations Governance & IT Compliance

I was having lunch with one of my long-term MSP clients the other day, and we were discussing what the next ten years of his business might look like in relation to the technological advancements taking place all around us. He was particularly excited about the implications of the Internet of Things (or “IoT” for … Continued

Don’t Sue Your Employees. Train Them

By Jeremy Louise | April 8th, 2019 | Business Operations

As someone who handles a lot of IT and cyber security-related fixtures for small businesses every day, I spent a lot of my time on the phone talking to clients about all of the latest attacks. It happened again just the other day – one of my long-term clients called me up and wanted to … Continued

The Four Major IT Cleanings Your Business Should Take Care Of This Spring

By Jeremy Louise | March 25th, 2019 | Business Operations

As someone who quite literally grew up in the managed services industry, I believe that the importance of spring cleaning when it comes to your IT infrastructure is something that cannot be overstated enough. A lot of other people seem to share the same opinion, as evidenced by the plethora of “X Things You NEED … Continued

The Best Wheelchair Accessible Coworking Spaces in the Boston Area

By Jeremy Louise | March 21st, 2019 | Business Operations

TSI is like any other organization that has to consider the concerns of not just it’s clients but its employees to maintain its success. In order to address these areas, we’re always thinking of ways to improve work/life balance as well as identifying ways to accommodate to some of the more popular SMB employee retention … Continued

Databases Need Upgrades, Too: What the Impending SQL EOL Means to You

By Jeremy Louise | February 26th, 2019 | Network Security

By now, you’re undoubtedly aware that Microsoft will stop supporting their Windows 7 operating system on January 14, 2020. Much has been written about the need to upgrade to something more updated before that time, as you not only run the risk of compatibility issues with your critical applications and systems, but inaction will also … Continued

What Windows 7 End of Life Means and Why Upgrading is Critical to Your Business

By Chris Souza | February 11th, 2019 | Network Security

At TSI, we have years of experience managing the computer systems for over 160 New England organizations. A large part of that job involves making sure that all software and operating systems being used by these businesses are up to date and secure – something that requires a proactive approach to the task to say … Continued

Do I Need a Pen Test? How To Know If Pen Testing Is The Right Move

By Jeremy Louise | January 14th, 2019 | Network Security

What is Penetration Testing? Penetration testing, also commonly referred to as ethical hacking or “pen testing” for short, is a process in which a business thoroughly tests its computer system, its network or its applications in an effort to uncover any and all security vulnerabilities that could potentially be exploited by someone with malicious intentions. … Continued

10 Questions to Validate Your Backup and Disaster Recovery Strategy

By Jeremy Louise | January 4th, 2019 | Backup & Disaster Recovery

A backup and disaster recovery strategy is exactly what it sounds like: a plan for how you’re going to restore all of your critical electronic information in the event that you suffer from some type of disaster. If your office burns to the ground, this strategy will allow you to pick right up again at … Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979