TSI's Information Technology Blog
What Is a Common Indicator of a Phishing Attempt and How to Avoid Getting Hooked
Phishing season is in full swing, with a more sophisticated and increasingly deceptive hacking methodology that can hook even the savviest of us into providing confidential information. It’s why we found it fitting to round up a few examples of the most common and prevalent attacks we have faced this year. We also wanted to demonstrate ways to identify and avoid putting you or your company’s sensitive data at risk.
ContinuedCreate a Backup and Disaster Recovery Plan
We’re all familiar with the concepts of full and incremental image backups and their value in any backup and disaster recovery strategy. What is less known is how far many of today’s backup solutions actually go to ensure that the most critical aspects of your data, including its integrity are preserved and the amount of time needed to recover those very assets; most notably organizations using Microsoft Domain Controller and/or…
ContinuedIT Best Practices: Do You Need Cybersecurity Insurance?
As we’ve discussed in the past, there are countless cyber security tools and best practices to help mitigate the effects of a data breach as well as the impact they may have on SMBs. As the technology landscape…
ContinuedHow to be Productive in Life: Avoid Distractions and be Productive in a Tech-Filled World
Trying to accomplish tasks each day can prove nearly impossible with the constant pings, notifications, and alerts coming from your devices. All seemingly urgent, expertly crafted messages designed to pull you away from what you are doing. Here are some great tips and tricks to maintaining focus during those busy days…
ContinuedWhy The Opera Free VPN Should Matter To You
Opera’s latest update has introduced a free integrated Virtual Private Network (VPN) for all users. With the barrage of stories pertaining to leaks and personal information becoming public, the announcement of a mainstream browser offering unlimited VPN access through their browser was incredibly exciting! So let’s delve into what it all means…
ContinuedIT Security Best Practices for Offboarding: Mitigating Risk During an Employee Dismissal
Terminating employees is one of the most unpleasant aspects of managing people, learn how to properly plan and prepare for a dismissal from an IT standpoint…
ContinuedHow To Use Bussiness Technology While Traveling: A Tech Consultant’s Guide
The demands on SMB CEO’s have evolved alongside the growing capabilities of today’s technologies and the client’s own expectations. The challenge many are faced with is how to maintain that same level of accessibility while outside the office…
ContinuedDive into Cloud Capabilities and Cloud Computing Security
Cloud computing – simply put – is internet based computing in lieu of building or maintaining large in-house technology infrastructure. In the past, users would download software onto a physical computer or server in the office. Now with the prevalence of faster connectivity speeds and the remote nature of today’s workplace, SAAS models (software as a service) are becoming industry norms, enabling unprecedented levels of productivity, lessened hardware costs and…
ContinuedPassword Management Best Practices: The Importance of Strong Passwords
We all know strong passwords are the backbone to maintaining a secure network. With more of our private communications, banking, and health information being stored online, the security risk to our most personal data becomes an even greater danger. Creating a strong password is the first line of protection to your information; but how are we intended to remember the vast number phrases and special characters to gain access? More…
ContinuedTSI Business Success Stories: Rebecca’s Cafe
TSI recently completed a server replacement and backup solution for a bustling client, Rebecca’s Café. Arthur Lemieux, one of our project managers, along with a team of highly skilled engineers, managed the initiative while ensuring an extremely busy client experienced not only a seamless transition, but minimal downtime. Challenge: Rebecca’s Café has had tremendous growth, particularly within its event planning and catering services. As with many growing businesses, technology needs can change;…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
