Attention CFOs: Here’s One Way to Significantly Reduce IT Capital Expenditures That You’ve Probably Overlooked

By Jeremy Louise | August 23rd, 2018 | Business Operations

The other day, I was having a conversation with a friend of mine who also just so happens to be a Chief Financial Officer (CFO). As is the case more often than either of us would like, our friendly chat quickly turned to business. He asked me how some of our clients budget their capital … Continued

Are You Preparing for an Acquisition? Don’t Forget About Your IT

By Jeremy Louise | August 21st, 2018 | Business Operations

Being at one of the leading IT services firms in Boston, Cambridge and the greater New England area, one of the major things that excites me every day is the fact that we often find ourselves in the epicenter of biotech and pharma innovation in the modern era. In addition to helping break new ground … Continued

What to do during a Ransomware Attack?

By Roger Murray | September 28th, 2016 | Network Security

The topic of Ransomware is a steadily increasing mainstream topic affecting both small and large businesses alike.  We’ve discussed some of these common types of intrusions before, this type of malware encrypts your data and holds it for ransom to receive the key, it requires a fast acting user in order to minimize the amount … Continued

Study Reveals More Than 50% of SMBs Have Experienced a Data Breach in Past Year

By Roger Murray | August 8th, 2016 | Network Security

A new study on the topic of Cyber-security and the proliferation of cyber-attacks against Small and Medium-Sized Businesses (SMB) was released this month. Historically, criminals would focus attacks on larger enterprise level organizations in an effort to reap a much larger reward. However, the level of technical expertise needed to infiltrate these companies’ security required … Continued

Microsoft Azure: A Simple Backup Solution

By Roger Murray | July 28th, 2016 | Backup & Disaster Recovery

The majority of us are familiar with the topic of Backup and Recovery.  It is a hot topic in the prevention of total data loss for any organization, as well as providing a level of assurance that if your network was attacked by one of the copious types of Ransomware out there, we could restore … Continued

Last Call for Windows 10 Upgrade

By Roger Murray | July 7th, 2016 | Network Infrastructure

By now, most Windows users have received more than their fair share of notifications and reminders regarding the looming Windows 10 deadline.  With July 29th fast approaching, TSI wanted to provide some insight to the latest Microsoft operating system update.  After the 29th, Microsoft will begin charging $120-$200 per user, depending on the edition and … Continued

Top 3 VOIP Security Risks

By Roger Murray | July 6th, 2016 | Governance & IT Compliance

In today’s day and age we have become familiar and hopefully cautious when receiving strange emails with a random file attached. It’s unlikely that we would give it a second thought before deleting. This is because we recognize the need for cyber security to limit the onslaught of digital threats we receive on a seemingly … Continued

Are you *REALLY* PCI Compliant?

By Roger Murray | June 23rd, 2016 | Governance & IT Compliance

If your business processes credit cards or other forms of electronic payment, it is required to meet the standards established by the Payment Card Industry (PCI).  That means not only retailers, but any establishment that accepts card payments in their place of business.  If you don’t maintain PCI standards for compliance and suffer a data … Continued

Moving Offices? Important Relocation Considerations from our IT Experts

By Jeremy Louise | June 15th, 2016 | Business Operations

Relocating to a new office can be an extremely stressful and time consuming ordeal. Between managing the logistics of the physical move, coordinating employees and the hiccups that always arise at the most inopportune moments, it can easily become a full time endeavor that takes away from focusing on your daily tasks and core competencies. … Continued

Avoid Getting Hooked This Phishing Season!

By Roger Murray | May 31st, 2016 | Network Security

Phishing season is in full swing, with a more sophisticated and increasingly deceptive hacking methodology that can hook even the savviest of us into providing confidential information. It’s why we found it fitting to round up a few examples of the most common and prevalent attacks we have faced this year. We also wanted to … Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979