TSI's Information Technology Blog
Cyber Security Tips: Outsourcing Cyber Security with a FTE IT Expert
I’m often struck by just how quickly the cyber security landscape continues to advance. Hacks and other types of threats are getting more sophisticated, yes – but so are the tools used to defeat them. Cyber attackers and the businesses they’re targeting are making every effort to stay one step ahead of one another, in a relationship that shows no signs of slowing down anytime soon. I was talking to…
ContinuedWhat Is ISO 27001?: Information Security Certifications
This article was written with contributions from Timonthy Woodcome, director of NQA, a leading Global Certifications Body as well as the technical staff here at Technical Support International. Also officially known as ISO/IEC 27001:2013, ISO 27001 is a specification for a set of policies and procedures that outlines all of the legal, physical and even technical controls that make up a business’ information risk management process. This type of framework…
ContinuedFirewall Management: Log Monitoring and Auditing Basics
As part of my role at TSI, I meet with a wide range of different businesses. More often than not, when I ask about their current log monitoring efforts, people aren’t even sure what this really does, and are surprised to find how unequipped they’re cyber security strategy is. In this piece, I’d like to go into detail on what firewall log monitoring is, what it does and why it’s…
ContinuedWhat You Need to Know About the Government Revisiting Internet of Things Regulation
I was having lunch with one of my long-term MSP clients the other day, and we were discussing what the next ten years of his business might look like in relation to the technological advancements taking place all around us. He was particularly excited about the implications of the Internet of Things (or “IoT” for short), and with good reason. If you had to single out a trend that has…
ContinuedCyber Security Defense: Give Your Employees Vishing and Phishing Training
As someone who handles a lot of IT and cyber security-related fixtures for small businesses every day, I spent a lot of my time on the phone talking to clients about all of the latest attacks. It happened again just the other day – one of my long-term clients called me up and wanted to discuss a story he’d read that was giving him concern. The first was the case…
ContinuedSecuring Medical Devices Means Securing Networks
As the CEO of Technical Support International, I’m well aware of the increased presence of Internet of Things (IOT) technology within the healthcare and medical device industries where approximately 60% of such organizations have already introduced IoT devices into their facilities and by the end of the year, are predicted to climb to 89%. 73% of the businesses that already use these devices, are doing so for patient monitoring for…
ContinuedCybersecurity Defense: IT Spring Cleaning Checklist
As someone who quite literally grew up in the managed services industry, I believe that the importance of spring cleaning when it comes to your IT infrastructure is something that cannot be overstated enough. A lot of other people seem to share the same opinion, as evidenced by the plethora of “X Things You NEED to Do When Spring Cleaning Your IT Systems” articles my clients keep sending me. On…
ContinuedThe Best Wheelchair Accessible Coworking Spaces in Boston
TSI is like any other organization that has to consider the concerns of not just it’s clients but its employees to maintain its success. In order to address these areas, we’re always thinking of ways to improve work/life balance as well as identifying ways to accommodate to some of the more popular SMB employee retention trends, like company-wide wellness initiatives and programs. However, it wasn’t until recently when one of…
ContinuedViewpoint: No business is too small to be cyber-targeted
As someone responsible for managing the marketing communications of one of the oldest and most experienced outsourced IT companies in New England, it’s safe to say I spend a lot of my time writing about the dangers that exist for small and medium-sized organizations in today’s climate. This is true both in terms of how these businesses are making meaningful use of their technology … but it’s especially true with…
ContinuedSQL Best Practices: What the Impending SQL 2008 End of Life Means For You
By now, you’re undoubtedly aware that Microsoft will stop supporting their Windows 7 operating system on January 14, 2020. Much has been written about the need to upgrade to something more updated before that time, as you not only run the risk of compatibility issues with your critical applications and systems, but inaction will also expose your business to a wide range of security threats that you would do well…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
