TSI's Information Technology Blog
Network Security Threats: Data Breaches Up 29 Percent Over Last Year
Data breaches are running 29% above last year, according to a report released by the Identity Theft Resource Center and Cyberscout. Hacking was the leading cause of data breaches nationwide, more than 790 so far this year. More than 12 million records have been exposed, although two-thirds of data breach notifications or public notices did not report the number of records compromised. “Only 33 percent of data breaches reported this…
ContinuedData Security Compliance: Security Awareness Training & Compliance Requirements
Did you know there are over 8,500 different Local, State, and Federal standards & requirements your organization may be required to comply with? This staggering number can come as a surprise to many. That’s why we’ve taken the time to compile a list of the most common standards which may require your organization to implement a security awareness program.
ContinuedDigital Privacy & Digital Security: Is Online Privacy Dead?
Privacy…we all talk about it and we’re all concerned with losing it, but does it really matter? There are 1.94 billion active monthly Facebook users, 3.5 billion daily Google searches, and over 95 million photos & videos shared on Instagram each day. These are a few examples of the many apps, fun quizzes & surveys, or even online purchases, we conduct while granting third party access to our information in…
ContinuedWhy You Need to Learn Cybersecurity Basics
We live in a tech-driven world; whether in the office, at home, the car, or even in sky, the convenience and access to vast amounts of information is always a fingertip away. If you ignore innovation, you risk rendering yourself obsolete. However, when you’re responsible for making technology investment decisions for an entire organization, being “Tech Savvy” is not a choice. The protection of any organization relies heavily on people…
ContinuedWhat is the Future of Blockchain?
Blockchain is one of the hottest technologies right now. Its being marketed as one of the most secure database technologies for data-storage & file-sharing available. Blockchain skyrocketed to notoriety after its technology being used to protect Bitcoin. Nowadays, you’ll find that Blockchain has moved far beyond just cryptocurrency exchange. In fact, it has garnered the attention from many traditional financial services, such as Goldman Sachs and Bank of America. You’ll…
ContinuedEssential Network Security Tips: Provide Your Employees With Critical Network Security Training
Network Infiltration and Data Breaches are normally blamed on the malicious outsider. However, the responsibility for most organizations network security is with their employees, who unwittingly open the door welcoming cybercriminals into your environment. That’s why it’s crucial to properly educate your employees about Cybersecurity. When you provide routine training as a preventative, not reactive, measure; and develop formal written policies/procedures under the assumption that you will be infiltrated one…
Continued3 Tips to Ensure Smooth Azure Cloud Migration
Microsoft Azure is a cloud computing platform, among many functionalities Azure delivers solid recovery and replication services to ensure business continuity. But before implementing Azure for your organization, we recommend a few simple tips to making the process that much smoother… Develop an Implementation Roadmap When it comes to implementing a new cloud computing platform like Azure, it is important to consider which workloads are the most appropriate to move…
ContinuedEcommerce Security Tips: How to Protect Your User’s Sensitive Information
Topic: PCI, eCommerce eCommerce security is a constantly evolving topic for any organization, regardless of their size. As the CEO & Cofounder of Trellis, a local full-service design firm, we partner with organizations to develop robust WordPress & Magento websites. One of questions I often face is what a new or smaller business can do to improve their overall eCommerce Security without breaking the bank. Here are a few of…
ContinuedWhy a Hybrid Infrastructure Makes Sense For Small Businesses
The latest outages of Public Internet Cloud Services, which affected millions of Microsoft Office365 and Amazon Web Services users in the US, is yet another example for why I am a strong proponent for businesses to consider a mix of Cloud and On-Premise technologies for hosting their data, commonly referred to as a Hybrid Infrastructure. One of the most common complaints when cloud outages occur is determining the unknown. What…
ContinuedIOT Cybersecurity: Experiencing Security Fatigue?
As the CEO of an IT company, I often find myself speaking to people about what my company offers and what services we provide. Inevitably, the discussion will segue from technology, to the topic of internet security and privacy. We all desire complete control over what information we share, but it often feels like it is being chipped away at every turn in the name of commoditizing our daily activities. …
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
