TSI's Information Technology Blog
Everything You Need to Know About Network Vulnerability Assessments
It may come as of little surprise that security breaches hurt small business much more than larger corporations. According to the National Cybersecurity Alliance, more than 70% of attacks target small businesses. It is also estimated that 60% of hacked small businesses experience devastating economic hardship, leading many to suffer a complete loss, closing their doors within six months following a breach. While discounting the need for security may save…
ContinuedWhat is The Difference Between an Information Technology Audit and a Technology Assessment?
The term Information Technology (IT) Assessment is often convoluted because it is so often portrayed as the simple and easy process of scanning an organization’s existing network. However, this could not be further from the truth. It is important to remember that a formal Technology Assessment is not a Technology Audit. The use of terminology is not just about semantics, but rather expectations. An audit is a required procedure conducted…
ContinuedNetwork Security Best Practices: What To Do With A Mysterious Thumbdrive
So if you found a USB Stick in the parking lot this morning, what would you do? What if you found one in the course of your job, in a rental car, or in a “Lost & Found” box in your office? You would be curious to see what is on the drive or inclined to try and locate who it belongs to. What would you consider the chances are…
ContinuedWhat To Do After a Ransomware Attack
The topic of Ransomware is a steadily increasing mainstream topic affecting both small and large businesses alike. We’ve discussed some of these common types of intrusions before, this type of malware encrypts your data and holds it for ransom to receive the key, it requires a fast acting user in order to minimize the amount of damage it can cause to your machine or business infrastructure. The aftermath of a…
ContinuedIT Outsourcing: Outsourcing Disaster Recovery and Other IT Services
There is a considerable amount of time and capital invested by business owners into their information technology (IT) infrastructures; it is often recognized as a vital component and foundation to the future success of an organization. Many hire outside IT service providers and specialists to either supplement their existing IT, or act as a business partner in providing solutions to meet the demands of their company. The level of technical…
ContinuedBack To School Essentials: Best Tech for College & High School
It’s that time of year again! From elementary through college, the school year has officially begun. What does this mean? That it’s time to get the latest tech to make the daily hustle of class infinitely better. However, sifting through the mountain of options available in the marketplace to determine which is worthy of your dollar can be hard. Lucky for you, we’ve rounded up the best of the best…
ContinuedEmail Security Best Practices: How to Secure Your Email
E-Mail is one of the most commonly used applications in the world. It provides organizations with a quick and cost effective means to communicate and, from inception, it quickly became a necessity most businesses could not live without. However, hackers are keenly aware of this fact as well and continuously devise new creative ways to exploit any possible vulnerabilities for profit. At TSI, we strive to provide our clients with…
ContinuedTechnology in the Workplace: Portable Devices Are The New Normal
The trend of mobility and a more fluid workplace have changed professional environments in a relatively short period of time. Mobile technology such as smartphones and tablets continue to redefine the way we work, because it changes when and where we are able to conduct business. We work from home, take conference calls en route to meetings, and send messages while 30,000 feet in the air. The push to mobile…
ContinuedWhy You Should Employ a Managed Service Provider (MSP)
One of the most common questions I face when meeting potential clients is “Why should I use a Managed Service Provider?”. In order to fairly answer this question, traditional methodologies and misconceptions about what a Managed Service Provider (MSP) is, need to be thrown out the window. The simplest definition of a managed service is that it allows your business to delegate IT operations to a service provider. Complete IT…
ContinuedWhy is Cybersecurity Important? Half of SMBs Suffered Data Breaches In the Past Year.
A new study on the topic of Cyber-security and the proliferation of cyber-attacks against Small and Medium-Sized Businesses (SMB) was released this month. Historically, criminals would focus attacks on larger enterprise level organizations in an effort to reap a much larger reward. However, the level of technical expertise needed to infiltrate these companies’ security required significant time and investment in order to successfully, if ever, penetrate the network. Soon, attacks…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
