TSI's Information Technology Blog
Digital Privacy & Digital Security: Is Online Privacy Dead?
Privacy…we all talk about it and we’re all concerned with losing it, but does it really matter? There are 1.94 billion active monthly Facebook users, 3.5 billion daily Google searches, and over 95 million photos & videos shared on Instagram each day. These are a few examples of the many apps, fun quizzes & surveys, or even online purchases, we conduct while granting third party access to our information in…
ContinuedWhy You Need to Learn Cybersecurity Basics
We live in a tech-driven world; whether in the office, at home, the car, or even in sky, the convenience and access to vast amounts of information is always a fingertip away. If you ignore innovation, you risk rendering yourself obsolete. However, when you’re responsible for making technology investment decisions for an entire organization, being “Tech Savvy” is not a choice. The protection of any organization relies heavily on people…
ContinuedWhat is the Future of Blockchain?
Blockchain is one of the hottest technologies right now. Its being marketed as one of the most secure database technologies for data-storage & file-sharing available. Blockchain skyrocketed to notoriety after its technology being used to protect Bitcoin. Nowadays, you’ll find that Blockchain has moved far beyond just cryptocurrency exchange. In fact, it has garnered the attention from many traditional financial services, such as Goldman Sachs and Bank of America. You’ll…
ContinuedEssential Network Security Tips: Provide Your Employees With Critical Network Security Training
Network Infiltration and Data Breaches are normally blamed on the malicious outsider. However, the responsibility for most organizations network security is with their employees, who unwittingly open the door welcoming cybercriminals into your environment. That’s why it’s crucial to properly educate your employees about Cybersecurity. When you provide routine training as a preventative, not reactive, measure; and develop formal written policies/procedures under the assumption that you will be infiltrated one…
Continued3 Tips to Ensure Smooth Azure Cloud Migration
Microsoft Azure is a cloud computing platform, among many functionalities Azure delivers solid recovery and replication services to ensure business continuity. But before implementing Azure for your organization, we recommend a few simple tips to making the process that much smoother… Develop an Implementation Roadmap When it comes to implementing a new cloud computing platform like Azure, it is important to consider which workloads are the most appropriate to move…
ContinuedEcommerce Security Tips: How to Protect Your User’s Sensitive Information
Topic: PCI, eCommerce eCommerce security is a constantly evolving topic for any organization, regardless of their size. As the CEO & Cofounder of Trellis, a local full-service design firm, we partner with organizations to develop robust WordPress & Magento websites. One of questions I often face is what a new or smaller business can do to improve their overall eCommerce Security without breaking the bank. Here are a few of…
ContinuedWhy a Hybrid Infrastructure Makes Sense For Small Businesses
The latest outages of Public Internet Cloud Services, which affected millions of Microsoft Office365 and Amazon Web Services users in the US, is yet another example for why I am a strong proponent for businesses to consider a mix of Cloud and On-Premise technologies for hosting their data, commonly referred to as a Hybrid Infrastructure. One of the most common complaints when cloud outages occur is determining the unknown. What…
ContinuedIOT Cybersecurity: Experiencing Security Fatigue?
As the CEO of an IT company, I often find myself speaking to people about what my company offers and what services we provide. Inevitably, the discussion will segue from technology, to the topic of internet security and privacy. We all desire complete control over what information we share, but it often feels like it is being chipped away at every turn in the name of commoditizing our daily activities. …
ContinuedBest Practices For Social Media: How Your Next Post Can Get You Fired
We all say or post personal comments from time to time; in fact, social media encourages us to express our every thought, often for the whole world to see. However, before you post your latest status, take a moment to consider potential repercussions. We are seeing more and more stories of people being reprimanded, or worse, terminated, for their social media activity, even when it is occurring in their personal…
ContinuedHow to Recover From Ransomware: Can Your Business Survive a Ransomware Attack?
When your business is hit by crypto-malware, you become keenly aware of just how little preparation and planning you have done to prevent your data from being compromised. SonicWALL reported Ransomware Attacks on businesses of all sizes reached $638 million in 2016, a considerable uptick from the $3.8 million reported in 2015. The exponential growth can be easily attributed to one factor, its effectiveness. The first quarter of 2016 alone…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
