TSI's Information Technology Blog
Why You Should Scam Your Own Employees
Identifying network vulnerabilities, as well as the right tools to address them, have become of major concern to many organizations. According to industry leaders, businesses should consider a rather unorthodox approach to educating and identifying exactly how prone they are to a data breach, scam their employees. Simulating phishing attacks provide a quantifiable insight at precisely how employees interact with suspicious attachments and/or links received in their Inbox. While most…
ContinuedTips to Make Your Business Winter Ready
Hacks and Ransomware Attacks often catch the headlines for their wide impact and compromised data. However, for many businesses located in colder climates, a very real threat to their daily operations revolve around the worst winter weather, much of which is still ahead of us. Inclement winter weather can lead to disruptions in your normal business. In fact, the latest 2017 Economic Report of the President indicates weather-related incidents cost…
ContinuedPrevent a HIPAA Breach: How to Prevent Data Breaches
In 2016, the Health Insurance Portability & Accountability Act (HIPAA) collected over 23 Million in Civil Money Penalties (CMPs) related to businesses violating patient data privacy provisions. Over half of the cases involved organizations who failed to even have a proper risk assessment conducted. The cost for violating HIPAA privacy protections continue to grow, which is why we decided to provide a list of the most common violations, as well…
ContinuedBusiness Continuity Solutions: New Year, New Approach to Disaster Recovery & Backup Plans
One of the essential components to any business revolves around the protection of their data. Continuity in the event of an IT disaster, or even minor downtime, is critical. Ensuring your business can access critical information in those moments, as well as having the ability to recover can save thousands of dollars per hour depending on the size of your business. No More Tapes… The traditional approach to backup and…
ContinuedCybersecurity tips: 5 Things Every Small Business Should Know
Nearly every business believes the unfortunate data breaches and attacks only happen to others; that the overall risk of an attack on your business is low. Why would anyone care to target me? The truth is that hackers would love nothing more than to gain access to your sensitive company data. It’s why we decided to develop a list of 5 things every small business should keep in mind through…
ContinuedSmall Business Cyber Security Plan: Why Your Business Needs a WISP
Not having a written information security program (WISP) for your business could be putting your data at risk of not only theft, but substantial legal/punitive damages. The laws in Massachusetts enforce strict guidelines to safeguard any personal information of individuals stored on your network. Sadly, many SMBs brush it off as a minimal danger that is unlikely happen to them. Despite studies that show the assumption to be untrue, in…
ContinuedIT Management Services: 5 Things to Look for in a Managed Service Provider
The role of IT in up & coming businesses often becomes an afterthought. One day, you are a small team with a singular goal, with a lot of hard work and a bit of luck, your business begins to thrive; staff assume more and more responsibilities to keep things moving smoothly, before you know it, the office manager is the internal IT expert. Sound familiar? Perhaps it is time to…
ContinuedNetwork Security Best Practices: Could the Real Threat to Your Business’ Network Come From the Inside?
Today, the number of types of cyber-attacks which threaten the security of your businesses are endless. We’ve discussed the greatest weakness in network security being users before, but the focus was in a non-acting participant being coerced into clicking on a malicious link or opening a dangerous attachment. We often focus so much attention to building a secure network wall that we neglect the very real threat from within. According…
ContinuedWhat are the Advantages of IaaS & Cloud Computing?
While the reasons behind considering a cloud based network infrastructure may vary, businesses across all industries and sizes are turning to the cloud to scale their organization. The adoption of cloud services is accelerating at a much more rapid pace than previously anticipated, with a considerable amount considering an Infrastructure-as-a-Service (IaaS) environment. But what are the benefits to cloud, and more importantly, what does IaaS mean? I sat down with…
Continued5 Holiday Cyber Security Tips to Keep Your Information Secure This Season
There is a certain amount of accepted risk associated with shopping, especially during the holiday season. Identify theft and fraud have become an accepted risk for many online and retail shoppers. This year is thought to see an even greater level of attacks aimed toward the consumer market, ranging from malicious sites exploiting your data for ransom, to capturing credit card information. The hacker’s approach is to seek the easy…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
