TSI's Information Technology Blog
Your Organization Needs an Incident Response Plan Today!
Christopher Souza | CEO In today’s rapidly evolving threat landscape, cybersecurity incidents are no longer a question of if, but when. Cyberattacks, data breaches, and ransomware events continue to rise in frequency and sophistication, leaving organizations exposed to severe financial, operational, and reputational damage. Amidst these risks, having a well-developed Incident Response Plan (IRP) is essential, not just for organizations with compliance obligations but for any business that values security…
ContinuedCybersecurity Awareness Month: Strengthen Your Defenses with These 5 Critical Services
Christopher Souza | CEO As a trusted Managed Service Provider (MSP) and Managed Security Service Provider (MSSP), we know how devastating cyber-attacks can be. In recognition of Cybersecurity Awareness Month, we’ve put together this guide to help your business stay ahead of evolving threats by highlighting five essential security services to help bolster your defenses and safeguard your sensitive data. Protect your business by taking the right steps today, because…
ContinuedTSI Employee Spotlight: Michael Buckley
Starting his journey as a humble desktop technician, Michael has worked his way up to Interim IT Director, where he has developed expertise in developing IT strategies and managing key cyber security projects. Outside of work, Michael enjoys exploring new activities that keep him physically active and mentally sharp, always seeking fresh challenges for both his mind and body while simultaneously trying not to stress so much on the little…
ContinuedHow To Set Up a Secure Wi-Fi Network
Setting up a secure Wi-Fi network is essential for helping safeguard your organization from cybersecurity threats, so we’ve developed 7 recommendations to help guide you through the process! 1. Use Strong Encryption One of the most basic but essential steps to secure your network from cyber threat actors is to set-up your wireless network with strong encryption standards. The Wi-Fi Protected Access (WPA) protocol comes in two versions: WPA2 and…
ContinuedMacOS Sequoia 15 Vulnerability
There is a critical flaw in MacOS’s latest update, MacOS Sequoia (15.0), which is causing Macs to become inoperable. If you have not yet updated your Mac device, TSI strongly advises against upgrading to MacOS Sequoia (15.0 ) due to known issues that may render the Mac unable to access the internet, or, in the worst case, un-bootable. If you have already upgraded your Mac and everything is functioning normally,…
ContinuedCritical VEEAM Backup Vulnerability
Multiple critical vulnerabilities are affecting several Veeam products. On September 4, 2024, Veeam released a security bulletin addressing several vulnerabilities impacting various Veeam products; three of which are classified as critical. Vulnerability CVSS Affected Product Description: Currently, no active exploitation or publicly available proof of concept (PoC) exploit code has been observed, however, given the history of ransomware targeting Veeam products, it’s crucial to act swiftly. TSI’s Proposed Next Steps…
ContinuedTSI Day 2024!
Christopher Souza | CEO We recently celebrated TSI Day, a special occasion dedicated to honoring all of our hardworking employees and their accomplishments. We’re proud to have such a remarkable team and are so appreciative for everything that they do for TSI and our clients. About Technical Support International TSI is 35-year old cybersecurity (MSSP) and IT support (MSP) company specializing in helping DIB organizations address their NIST 800-171 and…
ContinuedVMware ESXi Security Alert
Christopher Souza | CEO A critical VMware ESXi security flaw, CVE-2024-37085, is being exploited by ransomware groups. CVE-2024-37085 allows attackers to give themselves full administrative access to the ESXi hypervisor by exploiting Active Directory integration. This is possible due to an automatic configuration mode that all VMWare ESXi servers enter when Active Directory integration is used. By leveraging this automatic configuration feature, attackers who can gain enough access to Active…
ContinuedHow to Choose an IT Services Partner
Christopher Souza | CEO While many managed service providers advertise their technical skills and certifications, potential customers should analyze their core values as well. Technical skills are relatively constant throughout the market, but focuses on teamwork and continuous improvement are rare and should greatly influence your vendor decision. The truth is, all managed services providers (MSP) are far more alike than people realize – ourselves included. They all use the…
ContinuedEthan Norris | Marketing Coordinator As you may have heard, there was a significant outage currently affecting CrowdStrike services, which caused widespread disruptions to Windows systems globally. This issue was being reported across the globe and has been traced back to a problem with the CrowdStrike Falcon Sensor. CrowdStrike confirmed the issue in an alert at 1:30 a.m. ET on 7/19/2024, stating: “CrowdStrike is aware of reports of crashes on…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place