TSI's Information Technology Blog
Cyber Crime Cases: Infected USB Drives Distributed at Data Security Event
During a recent data security expo hosted by Taiwan’s Presidential Office, 54 malware-infested thumb drives were handed out to the public by the Criminal Investigation Bureau. These infected USB sticks were among the 250 drives the bureau gave to winners of a game about cybersecurity knowledge at their exhibit.
ContinuedAvoid A New Strain of Cloud Email Ransomware: Cloud Security Management
A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time. A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure.
ContinuedTop 25 Most Popular Passwords of 2017
Each year, researchers from SplashData revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year. Despite the continued warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information.
ContinuedData Breaches News: Hilton Data Breach Results in Penalty
Hilton Hotels reached a settlement this month with New York Attorney General Eric T. Schneiderman and Vermont Attorney General TJ Donovan following two breaches in 2015. The settlement totaled $700,000
ContinuedStay Tech Compliant: 7 Ways to Properly Dispose or Decommission Old Technology
Whether you are moving to the cloud, refreshing equipment, moving offices and/or data centers, or simply cleaning house, properly discarding of old machines can be a tough task. The complexity of decommissioning IT assets only becomes more of a burden when you’re working in a highly regulated industry sector.
ContinuedAntivirus For Chrome: ESET Powers Google Virus Protection and Detection Program
Chrome Cleanup uses ESET technology to identify and eradicate suspicious or unwanted software on your Windows computer. The tool operates in the background, with no slowdowns or interruptions to the user with three easy steps.
ContinuedCybersecurity Defense: The Best Protection Against Ransomware
I just found a very interesting blog post by Jerome Wendt, President & Lead Analyst of DCIG, Inc., an independent storage analyst and consulting firm. He started out with “The prevailing wisdom is that if you back up your data you can recover from a ransomware attack. While this premise generally holds true, simply backing up your data no longer provides an absolute guarantee that you can recover from a…
ContinuedRansomware News: The Current State of Ransomware Among SMBs
In a report conducted by Osterman Research and sponsored by Malwarebytes, more than 1,000 small and medium-sized businesses were surveyed in June 2017 about ransomware and other critical security issues. What we discovered was surprising—ransomware authors aren’t only targeting enterprise businesses for big payouts. They’ve got their greedy gaze on businesses of all sizes. In fact, 35 percent of SMB organizations surveyed were victims of a ransomware attack. And while…
ContinuedNetwork Security Threats: Data Breaches Up 29 Percent Over Last Year
Data breaches are running 29% above last year, according to a report released by the Identity Theft Resource Center and Cyberscout. Hacking was the leading cause of data breaches nationwide, more than 790 so far this year. More than 12 million records have been exposed, although two-thirds of data breach notifications or public notices did not report the number of records compromised. “Only 33 percent of data breaches reported this…
ContinuedData Security Compliance: Security Awareness Training & Compliance Requirements
Did you know there are over 8,500 different Local, State, and Federal standards & requirements your organization may be required to comply with? This staggering number can come as a surprise to many. That’s why we’ve taken the time to compile a list of the most common standards which may require your organization to implement a security awareness program.
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
