TSI's Information Technology Blog
Four Ways vCISOs Help Avoid CMMC Compliance & Security Program Mistakes
If you operate within the U.S. defense industrial base (DIB), you’re likely well aware of the CMMC—and now the CMMC 2.0’s—compliance mandates, including the immediate and long-term impact they will present to your organization. Despite the challenges and steep costs associated with implementing a CMMC compliant environment, doing business with the Department of Defense (DoD) will require DIB contractors to adhere to this compliance framework, which is nothing short of…
Continued5 CMMC 2.0 Updates You Need to Know!
As you may have heard, the recent changes to the CMMC requirements have caused many DIB contractors to rethink their compliance implementation strategies so we wanted to take this opportunity to help clarify some of the most common questions our own clients have been asking as well as share some critical- and not so obvious- insights to help steer your organization in the right direction during this provisional review period.…
ContinuedTSI Joins Exostar’s CMMC Partner Network to Help DIB Companies Navigate Evolving DoD Cybersecurity Requirements
TSI’s Clients to Benefit from Exostar’s Robust, Easy-to-Use DoD Cybersecurity Compliance Products FOXBORO MA-June 9th, 2022: TSI, an IT Managed Services (MSP) and Managed Security Service Provider (MSSP), today announced it has joined Exostar’s CMMC partner network to help DoD contractors navigate and fulfill their Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity compliance requirements, including NIST 800-171 and CMMC 2.0. By leveraging Exostar’s powerful application, Certification Assistant, TSI will be…
ContinuedWhat To Do: Apache’s Log4j Vulnerability
Apache’s Log4j is a powerful open-source logging library used by millions of developers worldwide. However, Apache recently discovered an extremely dangerous vulnerability that could leave your applications and servers vulnerable to attack! In this blog post, we will explain what the Log4j vulnerability is, and how you can protect your organization from being exploited. We will also provide instructions on how to upgrade your Log4j installation. So don’t wait –…
ContinuedJonas: Target of a Security Breach
We wanted to bring to your attention that Jonas has recently been the target of a security breach. The breach appears not to pose any immediate risk at present, but it may become an issue down the road, so we’re proactively reviewing updates from JONAS to address the potential impact. In short, we wanted to take the opportunity to address any potential concerns you currently may have and inform you…
ContinuedGoDaddy’s Data Breach Exposes 1.2M Customers
There has been a data breach involving 1.2 million GoDaddy customers that we would like to bring your attention to. This breach has only impacted organizations using GoDaddy’s Managed WordPress service, so if your organization subscribes to this service, it’s absolutely critical that you work with your website administrator to reset your passwords as soon as possible to avoid any further data loss or exposure to your site. GoDaddy disclosed…
ContinuedMicrosoft’s PrintNightmare Vulnerability Finally Patched!
We are happy to inform you that the PrintNightmare vulnerability has now been resolved. Once the patch is checked by our team and they begin applying it during the pre-scheduled maintenance window, you will be able to access print services at any time throughout the day moving forward. In order for this patch to be applied, it’s absolutely critical that your users reboot their machines- not just shut them down-…
ContinuedCreating and Managing a Sustainable CMMC Compliance Program
In partnership with Exostar, TSI held a successful webinar on the topic of “Creating and Managing a Sustainable CMMC Compliance Program”. Our webinar was recorded HERE, allowing you to get an understanding of our approach to helping businesses to achieve and maintain a successful cybersecurity program toward CMMC compliance. Furthermore, we have addressed topics such as policy development and documentation, IT CMMC requirements, engaging with CMMC 3 certificate ready RPO/Service…
ContinuedCyber Risk Alert: Windows 11 Security Concerns & Why You Shouldn’t Download the Update
Microsoft may have prompted you to download the latest Windows 11 update . Please do not download it, and advise your team as soon as possible to avoid it. Unfortunately, there may be a considerable risk with a number of security (eg. Sophos and Malwarebytes) and TSI network management tools not working and negatively impacting the security posture and network performance of your organization. In some cases, users may be…
ContinuedTSI Cyber Security: Apple’s Latest IOS Security Update
As part of this month’s security updates, we wanted to bring to your attention a number of critical Apple vulnerabilities impacting smartphone, iPad, Apple Watch and MacBook iOS to your attention: iOS 14.8 iPadOS 14.8 MacOS Bug Sur 11.6 WatchOS 7.6.2 If you or your team use these devices, we highly recommend that you routinely encourage them to regularly check for and apply the most recent updates for their Apple…
ContinuedCategories
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
