TSI's Information Technology Blog
Best Mobile Phones for Business
For years, Blackberry dominated the field as the best mobile phone for businesses and professionals.They were one of the first phones that had a full keyboard – perfect for sending emails on the go – and they’re incredibly secure. To this day, the President of the United States uses a Secret Service approved Blackberry. As consumers began to look for more from their phones – whether it was sending emails or…
ContinuedPreventative Maintenance Is Right For Every Company
There are two approaches to maintaining your IT infrastructure – cross your fingers and hope it all works out, and then shell out for assistance when a virus takes over or a computer crashes; or invest in resources that will keep everything running smoothly. Many medium to large sized companies have an IT department in place or have hired a company (like TSI!) to take care of their IT issues…
ContinuedFive Email Management Tips
For some people, staying on top of their inbox is a breeze, but for others they’re facing literally hundreds of new emails every day and tackling it all can be a nightmare. In fact, you – or someone you know – may be notorious for responding to emails days later, after a decision has already been made. Or they may be the cog in the wheel that’s constantly holding up…
ContinuedTSI Project Spotlight: CCM Servers and SAN
As a Managed Services Provider, we receive all kinds of calls from our clients. Whether it’s to troubleshoot a broken printer, or pull together a fail-safe, foolproof Disaster Recovery plan, our Engineers are trained and ready for anything. And while we’ve got a variety of service contracts to suit our clients’ needs, there are times when the infrastructure that a client has in place can end up costing them more…
ContinuedWhat Is Net Neutrality?
On Thursday, February 26, 2015, in a 3-2 vote, the United States Federal Communications Commission (FCC) voted to approve the newest version of the Open Internet Order, which essentially ensures that Internet Service Providers (ISPs) “provide access to content and applications on an equal basis,” and prohibits ISPs from charging companies for quicker delivery times. While “Net Neutrality” has been a huge buzz word for the last few months, this…
ContinuedMaking The Internet of Things Work For You
The Internet of Things. You’ve probably been hearing about it a lot recently – we’ve even mentioned it in a post. But it’s not exactly the most descriptive term and has left many people scratching their head in wonder. We all know what the Internet is, and we all know what the general term “things” means – but when the two are strung together the entire concept becomes a bit…
ContinuedGetting Back To Work With A Business Continuity Plan
After last week’s post about Disaster Recovery, it’s time to jump into the topic that naturally follows –Business Continuity. Many individuals mistakenly presume that Business Continuity and Disaster Recovery are one in the same, but in all actuality, Disaster Recovery is simply one piece of a comprehensive Business Continuity plan. WhileDisaster Recovery focuses on restoring the IT infrastructure after a system wide failure (or complete destruction), Business Continuity looks at…
ContinuedThe Five Critical Parts to Any Disaster Recovery Plan
There are few things more important to a company’s IT needs than a comprehensive – and fool proof –Disaster Recovery plan. It’s something that probably barely registers as a necessity when a company is getting up and running, and when everything is operating smoothly it probably gets pushed to the furthest recesses of the proverbial back burner. But when it’s needed it can literally mean life or death for a…
ContinuedCyber Readiness – What Is It And Why You Need It
At the World Economic Forum in January John Chambers, CEO of Cisco Systems, predicted that 2015 would be the worst year yet for cyber-attacks, following a year that saw attacks on Sony, Target, Home Depot, JP Morgan, and other large companies. In the wake of those major hacks, and Mr. Chambers’ bold prediction, the term “Cyber Readiness” has been bandied about the media and offices alike. It’s aiming to be…
ContinuedTop IT Trends of 2015
As technology continues to improve it’s normal to expect to see a slight – or not so slight – shift in IT practices from year to year. In 2015, we’re expecting that now, more than ever, users will be taking their computer mobile and also heading to the cloud, and that there will be a huge emphasis on security and connectivity. With the help of Forbes and Information Management we’ve…
ContinuedCategories
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
