TSI's Information Technology Blog
Don’t Negotiate with (Cyber)Terrorists: Prevent Ransomware
It’s of the utmost importance to understand that paying off ransomware attacks doesn’t just present a considerate risk to your business, but to the country as well. On October 1, 2020, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued an advisory detailing these risks due to a steep increase in demand for ransomware payments that have skyrocketed during the COVID-19 pandemic. Their warning was very clear: “Facilitating…
ContinuedCompliance Update: GCC High Required For CMMC Levels 3–5 and CUI Managers
With enforcement set to begin for the CMMC, we’ve received a lot of questions from clients about the role that government licensing (GCC & GCC High) for CSPs (Office 365 Commercial, Azure, AWS etc.) will have in relation to addressing their respective CMMC 3-5 requirements. It’s long been known that this type of government licensing is extremely costly from both a price and implementation standpoint, and as a result, is…
ContinuedGSA Stars III Contractors Face New Rules: CMMC DoD
Critical Update for GSA Stars III Contractors; New IT Compliance Requirement Mandates Organizations that are listed under the GSA are companies that work with the government, outside of the DoD. It was recently announced (GSA STARS III CMMC Release) that- effectively immediately- GSA companies may have to begin adhering to the CMMC if required within their contracts. Although the majority of them falling under the CMMC 1 requirements, the CMMC…
ContinuedWe’re Updating TSI’s Managed IT Support Services: Security and Compliance Notification
As today’s cybersecurity threats increase in frequency, complexity, and impact, we’ve had to adapt our IT services model to address these very areas of focus. Over the last few years, this evolution has led TSI toward becoming a full-fledged Managed Security Services Provider (MSSP) that can not only help address your cybersecurity gaps but also help achieve our clients’ compliance requirements. As your trusted IT partner, it’s of the utmost…
ContinuedVulnerable Software: A 17-Year-Old Vulnerability Was Just Discovered in Windows Server
Meet SIGRed First “discovered” in July of 2020, SIGRed is a very particular type of vulnerability in the Windows DNS Server environment called an RCE, or remote code execution. This means that it can be triggered by an attacker with little more than a malicious DNS response. Believe it or not, it’s actually been around for 17 years and impacts all Microsoft O/S from Server 2003 all the way up…
ContinuedMSP Questions: How Much Does Your MSP/MSSP Know About CMMC Requirements?
1. Do they ‘practice what they preach’- Does your MSP/MSSP at least meet or exceed the same CMMC requirements that you need to follow? A: You’re only as strong as your weakest link…..It’s of the utmost importance that your MSP not only understand the complete set of CMMC requirements but that they’ve implemented at the very minimum, the comparable security controls that are being asked of you. Not only does…
ContinuedReview Your IT Strategy Plan and IT Planning Process
By now, there are probably very few out there who haven’t felt the negative impact of the Coronavirus pandemic – something that is still keeping roughly a third of the world’s population on mandatory lockdown with no end in sight. In addition to dealing with a workforce that is suddenly remote, you’re also likely coming up against a variety of budgetary freezes that seem like they couldn’t have come along at a…
ContinuedIdeas to Improve Company Culture
Everyone knew that working remotely was the way of the future… it’s just that most people probably didn’t realize “the future” would arrive quite as quickly as it did. According to one recent study, about 4.3 million people in the United States were already working from home at least half the time, a number that increased by an enormous 140% since 2005. But with the ongoing Coronavirus pandemic putting nearly three billion…
ContinuedHow to Web Conference Safely: Cybersecurity Risk Management
Over the last few weeks, more and more of our clients at TSI have quickly become comfortable with video and web conferencing solutions like Zoom – which is terrific. Still, we wanted to take this opportunity to remind you to stay up-to-date on all of the scams and vulnerabilities that are associated with these platforms, many of which are growing more common by the day. So many of these communications…
ContinuedProtecting Yourself Online: How to Beat Covid-19 Scammers
According to data recently released by the Federal Trade Commission, consumers have already lost about $5.85 million to various Coronavirus related schemes ALONE and likely don’t include those that haven’t been reported to the agency. With a costly $600 average loss per instance, it’s a seemingly lucrative tactic that does not appear to be going away. Unfortunately, it should come as no surprise that there is no shortage of malicious actors…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
