TSI's Information Technology Blog
Office Move Checklist: Be Prepared for Your Office Relocation
Relocating to a new office can be an extremely stressful and time consuming ordeal. Between managing the logistics of the physical move, coordinating employees and the hiccups that always arise at the most inopportune moments, it can easily become a full time endeavor that takes away from focusing on your daily tasks and core competencies. Ensuring that you’re ready to relocate on moving day requires a high level of organization…
ContinuedMeet the AI Virtual Assistant VIV: The Evolution of Digital Assistants
Every so often, a leap in technology occurs that opens up endless possibilities. During TechCrunch Disrupt in New York, we were able to watch a live demonstration of Viv, the evolution of digital assistants, from the creators of Siri.
ContinuedWhat Is a Common Indicator of a Phishing Attempt and How to Avoid Getting Hooked
Phishing season is in full swing, with a more sophisticated and increasingly deceptive hacking methodology that can hook even the savviest of us into providing confidential information. It’s why we found it fitting to round up a few examples of the most common and prevalent attacks we have faced this year. We also wanted to demonstrate ways to identify and avoid putting you or your company’s sensitive data at risk.
ContinuedCreate a Backup and Disaster Recovery Plan
We’re all familiar with the concepts of full and incremental image backups and their value in any backup and disaster recovery strategy. What is less known is how far many of today’s backup solutions actually go to ensure that the most critical aspects of your data, including its integrity are preserved and the amount of time needed to recover those very assets; most notably organizations using Microsoft Domain Controller and/or…
ContinuedIT Best Practices: Do You Need Cybersecurity Insurance?
As we’ve discussed in the past, there are countless cyber security tools and best practices to help mitigate the effects of a data breach as well as the impact they may have on SMBs. As the technology landscape…
ContinuedHow to be Productive in Life: Avoid Distractions and be Productive in a Tech-Filled World
Trying to accomplish tasks each day can prove nearly impossible with the constant pings, notifications, and alerts coming from your devices. All seemingly urgent, expertly crafted messages designed to pull you away from what you are doing. Here are some great tips and tricks to maintaining focus during those busy days…
ContinuedWhy The Opera Free VPN Should Matter To You
Opera’s latest update has introduced a free integrated Virtual Private Network (VPN) for all users. With the barrage of stories pertaining to leaks and personal information becoming public, the announcement of a mainstream browser offering unlimited VPN access through their browser was incredibly exciting! So let’s delve into what it all means…
ContinuedIT Security Best Practices for Offboarding: Mitigating Risk During an Employee Dismissal
Terminating employees is one of the most unpleasant aspects of managing people, learn how to properly plan and prepare for a dismissal from an IT standpoint…
ContinuedHow To Use Bussiness Technology While Traveling: A Tech Consultant’s Guide
The demands on SMB CEO’s have evolved alongside the growing capabilities of today’s technologies and the client’s own expectations. The challenge many are faced with is how to maintain that same level of accessibility while outside the office…
ContinuedDive into Cloud Capabilities and Cloud Computing Security
Cloud computing – simply put – is internet based computing in lieu of building or maintaining large in-house technology infrastructure. In the past, users would download software onto a physical computer or server in the office. Now with the prevalence of faster connectivity speeds and the remote nature of today’s workplace, SAAS models (software as a service) are becoming industry norms, enabling unprecedented levels of productivity, lessened hardware costs and…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
