TSI's Information Technology Blog
Cyber Security Defense: Give Your Employees Vishing and Phishing Training
As someone who handles a lot of IT and cyber security-related fixtures for small businesses every day, I spent a lot of my time on the phone talking to clients about all of the latest attacks. It happened again just the other day – one of my long-term clients called me up and wanted to discuss a story he’d read that was giving him concern. The first was the case…
ContinuedSecuring Medical Devices Means Securing Networks
As the CEO of Technical Support International, I’m well aware of the increased presence of Internet of Things (IOT) technology within the healthcare and medical device industries where approximately 60% of such organizations have already introduced IoT devices into their facilities and by the end of the year, are predicted to climb to 89%. 73% of the businesses that already use these devices, are doing so for patient monitoring for…
ContinuedCybersecurity Defense: IT Spring Cleaning Checklist
As someone who quite literally grew up in the managed services industry, I believe that the importance of spring cleaning when it comes to your IT infrastructure is something that cannot be overstated enough. A lot of other people seem to share the same opinion, as evidenced by the plethora of “X Things You NEED to Do When Spring Cleaning Your IT Systems” articles my clients keep sending me. On…
ContinuedThe Best Wheelchair Accessible Coworking Spaces in Boston
TSI is like any other organization that has to consider the concerns of not just it’s clients but its employees to maintain its success. In order to address these areas, we’re always thinking of ways to improve work/life balance as well as identifying ways to accommodate to some of the more popular SMB employee retention trends, like company-wide wellness initiatives and programs. However, it wasn’t until recently when one of…
ContinuedViewpoint: No business is too small to be cyber-targeted
As someone responsible for managing the marketing communications of one of the oldest and most experienced outsourced IT companies in New England, it’s safe to say I spend a lot of my time writing about the dangers that exist for small and medium-sized organizations in today’s climate. This is true both in terms of how these businesses are making meaningful use of their technology … but it’s especially true with…
ContinuedSQL Best Practices: What the Impending SQL 2008 End of Life Means For You
By now, you’re undoubtedly aware that Microsoft will stop supporting their Windows 7 operating system on January 14, 2020. Much has been written about the need to upgrade to something more updated before that time, as you not only run the risk of compatibility issues with your critical applications and systems, but inaction will also expose your business to a wide range of security threats that you would do well…
ContinuedShould You Upgrade From Windows 7: Threat and Vulnerability Management
At TSI, we have years of experience managing the computer systems for over 160 New England organizations. A large part of that job involves making sure that all software and operating systems being used by these businesses are up to date and secure – something that requires a proactive approach to the task to say the least. A lot of times, updates and software patches are the types of back…
ContinuedHow To Know If Network Pen Testing Is The Right Move
What is Penetration Testing? Penetration testing, also commonly referred to as ethical hacking or “pen testing” for short, is a process in which a business thoroughly tests its computer system, its network or its applications in an effort to uncover any and all security vulnerabilities that could potentially be exploited by someone with malicious intentions. This type of testing can either be automated and performed by specially designed computer software,…
Continued10 Questions to Validate Your Backup and Disaster Recovery Strategy for Business Continuity
A backup and disaster recovery strategy is exactly what it sounds like: a plan for how you’re going to restore all of your critical electronic information in the event that you suffer from some type of disaster. If your office burns to the ground, this strategy will allow you to pick right up again at a secondary location as if nothing ever happened – at least as far as your…
ContinuedThe Danger Of The Insider Threat, And Why Biotech And Pharma Should Care
The cyber security situation for nearly every industry is a precarious one, but few have it worse right now than biotech and pharma. I see this first hand in the day to day work my company does protecting Pharmaceutical and Biotechnology businesses from cyber threats, but I’m not the only one witnessing a trend. According to one recent study, the pharmaceutical sector is the biggest target of criminals around the…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
