Leadership Team

Jeremy Louise

Vice President Sales & Business Development

Jeremy Louise serves as Technical Support International’s VP of Sales and Business Development. In this role, Jeremy is responsible for all of TSI’s new business and plays a central role in the vision and overall strategic direction at TSI. His personal and professional experience growing up in the family business not only contribute to TSI’s continued success, but its emphasis on understanding SMB needs and the technology solutions needed to accomplish their objectives. Prior to his role as VP Sales, Jeremy earned his MBA from UIBS Belgium and his bachelor’s degree from Hobart College in Geneva NY. When not working with clients helping navigate today’s constantly changing technology landscape, he is out on the water fly fishing.

Jeremy Louise Stories

TSI Podcast Episode 2: Why You Should Be Scamming Your Employees

By Jeremy Louise | September 30, 2020

TSI · 2: Why You Should Be Scamming Your Employees Topics: Different Phishing / Vishing COVID trends Avoiding network attacks and breaches Different ways to simulate different types of intrusions and breaches from hackers Tips to avoid Phishing and Vishing exercises How Spam Sms & Call breach network security Participants: Jeremy Louise, Technical Support International |  jlouise@tsisupport.com Andrew Jellison, Votacall | ajellison@votacall.com

Continued

Critical Updates Regarding CMMC GCC & GCC High Licensing: How These Changes Will Impact your Organization’s CMMC Strategy

By Jeremy Louise | September 21, 2020
,

With enforcement set to begin for the CMMC, we’ve received a lot of questions from clients about the role that government licensing (GCC & GCC High) for CSPs (Office 365 Commercial, Azure, AWS etc.) will have in relation to addressing their respective CMMC 3-5 requirements. It’s long been known that this type of government licensing is extremely costly from both a price and implementation standpoint, and as a result, is…

Continued
The CMMC Hammer Has Dropped for GSA Stars III Contractors-banner

The CMMC Hammer Has Dropped for GSA Stars III Contractors

By Jeremy Louise | August 31, 2020
,

Critical Update for GSA Stars III Contractors; New IT Compliance Requirement Mandates Organizations that are listed under the GSA are companies that work with the government, outside of the DoD. It was recently announced (GSA STARS III CMMC Release) that- effectively immediately- GSA companies may have to begin adhering to the CMMC if required within their contracts. Although the majority of them falling under the CMMC 1 requirements, the CMMC…

Continued
TSI Security and Compliance Notification-banner

TSI Security and Compliance Notification

By Jeremy Louise | August 28, 2020
,

As today’s cybersecurity threats increase in frequency, complexity, and impact, we’ve had to adapt our IT services model to address these very areas of focus. Over the last few years, this evolution has led TSI toward becoming a full-fledged Managed Security Services Provider (MSSP) that can not only help address your cybersecurity gaps but also help achieve our clients’ compliance requirements. As your trusted IT partner, it’s of the utmost…

Continued
Content Ideation-banner (1)

TSI Employee Spotlight: John Bermingham

By Jeremy Louise | July 29, 2020
,

John Bermingham joined the team in 2020 as TSI’s resident cybersecurity and compliance expert. Throughout his twenty-five years in the IT and cybersecurity industry as a US Airman and later on as a contractor, John has worked with a wide variety of government agencies and companies to include ACS Defense Inc., Lockheed Martin Corp., Northrop Grumman Corp., and several Federally Funded Research and Development Centers (FFRDCs). We connected with John…

Continued
A 17-Year-Old-banner

A 17-Year-Old Vulnerability Was Just Discovered in Windows Server. Here’s What You Need to Know Next

By Jeremy Louise | July 23, 2020

Meet SIGRed First “discovered” in July of 2020, SIGRed is a very particular type of vulnerability in the Windows DNS Server environment called an RCE, or remote code execution. This means that it can be triggered by an attacker with little more than a malicious DNS response. Believe it or not, it’s actually been around for 17 years and impacts all Microsoft O/S from Server 2003 all the way up…

Continued