TSI's Information Technology Blog
Should You Upgrade From Windows 7: Threat and Vulnerability Management
At TSI, we have years of experience managing the computer systems for over 160 New England organizations. A large part of that job involves making sure that all software and operating systems being used by these businesses are up to date and secure – something that requires a proactive approach to the task to say the least. A lot of times, updates and software patches are the types of back…
ContinuedHow To Know If Network Pen Testing Is The Right Move
What is Penetration Testing? Penetration testing, also commonly referred to as ethical hacking or “pen testing” for short, is a process in which a business thoroughly tests its computer system, its network or its applications in an effort to uncover any and all security vulnerabilities that could potentially be exploited by someone with malicious intentions. This type of testing can either be automated and performed by specially designed computer software,…
Continued10 Questions to Validate Your Backup and Disaster Recovery Strategy for Business Continuity
A backup and disaster recovery strategy is exactly what it sounds like: a plan for how you’re going to restore all of your critical electronic information in the event that you suffer from some type of disaster. If your office burns to the ground, this strategy will allow you to pick right up again at a secondary location as if nothing ever happened – at least as far as your…
ContinuedThe Danger Of The Insider Threat, And Why Biotech And Pharma Should Care
The cyber security situation for nearly every industry is a precarious one, but few have it worse right now than biotech and pharma. I see this first hand in the day to day work my company does protecting Pharmaceutical and Biotechnology businesses from cyber threats, but I’m not the only one witnessing a trend. According to one recent study, the pharmaceutical sector is the biggest target of criminals around the…
Continued10 Cyber Security Awareness Tips
There’s so much information out there about hacks, threats and cyber security in general that it can be natural to feel overwhelmed and fatigued. You understand that the consequences of leaving your business exposed are severe – but at the same time, you don’t know where to begin to address them. You may even have a security strategy, but you’re not sure how well it would stand up to the…
ContinuedWhat Has Pharma Learned from the Merck Cyber Attack
If you had to make a list of some of the most pressing issues that we’re facing as a society, cybersecurity would undoubtedly be right at the top. Cybersecurity is a pressing issue to pharmaceutical businesses in particular, for a significant number of reasons. In 2017, one study revealed that about 54% of companies experienced one or more successful attacks that compromised data and/or their larger IT infrastructure at some…
ContinuedShould You Hire an onsite Jr IT Support Specialist?
If I had to make a list of some of the most common questions I get when speaking to customers with high urgency needs is, “should I hire a junior IT staff?” would undoubtedly be right at the top. It happened to me again, just this morning when I was on a conference call with a prospective client and we were attempting to preliminarily forecast their technology needs. This particular…
ContinuedThe Era of the VCIO: What Is It and Does It Really Matter
As someone with several decades of experience as a managed services provider under my belt, I’m often struck by how quickly technology continues to change the world around us. Thanks to IT, entire industries have been disrupted over the last few years to the point where they barely resemble the initial functions from where they were originally created. This is very true of organizations operating in high tech spaces, but…
ContinuedIT Compliance Management: The Strategic Approach to IT Compliance
I was talking to a prospective client the other day and the subject of DFARS/NIST DoD compliance came up. Obviously, cyber security is one of the most pressing issues of our age and when you’ve got the Department of Defense watching over you, that’s a pretty big deal. I asked him a little bit more about what he was currently doing to maintain that compliance, and his response made my…
ContinuedControlling the Cyber Security Costs: Why It’s a Lot Easier Than You Think
One of the common themes that’s permeated a lot of the meetings I’ve been having with both current and prospective clients lately can all be summed up in a single word: security. These chats may not, however, be taking the shape you probably think they are. Yes, cyber security is critical and it’s an issue that is only getting more pressing as time goes on. But I’ve also found that…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
