Resources

Find The Latest Security News, Trending Topics, & Success Stories

Network Security
Top 25 Most Popular Passwords of 2017

Each year, researchers from SplashData revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year.  Despite the continued warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information.

Business Operations
7 Ways to Properly Dispose or Decommission Old Technology

Whether you are moving to the cloud, refreshing equipment, moving offices and/or data centers, or simply cleaning house, properly discarding of old machines can be a tough task.  The complexity of decommissioning IT assets only becomes more of a burden when you’re working in a highly regulated industry sector.

Network Security
Unusual Ransomware Strain Encrypts Cloud Email In Real-Time

A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time.  A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure. 

2018 TSI Annual Shopping Outreach

By Nate | December 10th, 2018

The winter holidays are usually the most wonderful time of the year… unless they’re not. For many children and their parents this time of year is often depressing, stressful or simply goes by unnoticed due to more pressing problems. And this is the time of the year where we’re thankful for the opportunity help others … Continued

Microsoft April Patch Tuesday Fixes 65 Vulnerabilities, 24 Critical

By Kenneth Sprague | April 13th, 2018

With the Windows 10 1803 Spring Creators Update delayed at the eleventh hour for unknown reasons, admins and end users will still receive plenty of updates in the April 2018 Patch Tuesday.

10 Questions to Validate Your Security Strategy

By Jeremy Louise | December 3rd, 2018 | Business Operations Network Security

There’s so much information out there about hacks, threats and cyber security in general that it can be natural to feel overwhelmed and fatigued. You understand that the consequences of leaving your business exposed are severe – but at the same time, you don’t know where to begin to address them. You may even have … Continued

When to Consider Hiring Jr IT Staff

By Jeremy Louise | November 6th, 2018 | Managed Services

If I had to make a list of some of the most common questions I get when speaking to customers with high urgency needs is, “should I hire a junior IT staff?” would undoubtedly be right at the top. It happened to me again, just this morning when I was on a conference call with … Continued

How To Manage IT Infrastructure During An Office Relocation

By Roger Murray| March 8, 2018

See how TSI aided one of Massachusett's fastest growing software companies in a highly coordinated office relocation. We discuss the decision to migrate servers to the cloud in order to ensure business continuity and reduce overall operational costs, as well as the importance of a technical assessment to identify potential issues, such as Wi-Fi connectivity and signal interference that commonly occurs in office high-rise environments. Continued

DFARS NIST 800-171: Compliance Checklist

By Roger Murray| October 20, 2017

The need for strong security measures to protect sensitive government data from hackers has never been more pertinent. To address this problem, the Department of Commerce National Institute of Standards & Technology has released NIST Special Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Infromation Systems & Organizations. If you are a contractor to governmental agencies, SP800-171 impacts your ability to continue doing business with the Government unless you are compliant. Continued

201 CMR 17.00: Massachusetts Compliance Guidelines

By Roger Murray| December 5, 2017

Massachusetts has a high standard for consumer protection that most states look to as a source to frame their own laws. 201 CMR 17.00 requires any business that stores or licenses personal infromation of residents in the state to notify the Office Of Consumer Affairs & Business Regulation, as well as the Office of Attorney General and those affected, within a reasonable amount of time of suspecting a breach of security. The notifications must include... Continued

Guide: How To Guard Against HIPAA Privacy Breach Fines & Violations

By Roger Murray| October 4, 2017

In 2016, the Health Insurance Portability & Accountability Act (HIPAA) collected over 23 Million in Civil Money Penalties (CMPs) related to businesses violating patient data privacy provisions. Over half of the cases involved organizations who failed to even have a proper risk assessment conducted. The cost for violating HIPAA privacy protections continue to grow, which is why we decided to provide a list of the most common violations, as well as how to avoid them. Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979