TSI's Information Technology Blog
Avoiding Human Error – A Look At Hillary Clinton’s Email Misstep
One of the most discussed pieces of technology news of the last several months has been surrounding Hilary Clinton’s private email server, which she used to conduct government business while acting as Secretary of State. It was revealed that Clinton had been sending emails containing classified information through her personal account which was being managed and administered by a civilian without security clearances. Undeniably, the national security implications associated with…
ContinuedFive Tips For Ensuring Cybersecurity When Online Shopping
Believe it or not – we’re on our way to the holiday season, full steam ahead! Whether or not you find yourself giving gifts at this time of year, you probably do a bit of online shopping. Who doesn’t? Black Friday sales have begun creeping earlier and earlier every year, and retailers capitalize on workers sitting at their desks the Monday after Thanksgiving by putting on some pretty enticing Cyber…
Continued4 Tips For A Strong BYOD Policy
One of the most important aspects of our job here at TSI is ensuring that our clients are able to effectively and efficiently do their jobs. With the winter and holiday seasons nearly here (a time of year that greatly impacts employee in-office attendance), now is a great time to step back and take a look at your company’s Bring Your Own Device (BYOD) policy. If your organization doesn’t have…
ContinuedSQL Server 2005 End of Support Deadline
Effective April 12, 2016 Microsoft will no longer be supporting SQL Server 2005. This means that as of that date Microsoft will no longer be pushing out security updates or hot fixes and, as a result, your organization could be left facing vulnerabilities such as: – Impaired function of applications based off of the SQL Database, – Applications that are at risk for security breaches or bugs, – Backups that…
ContinuedThe Danger of Phishing
Phishing – you’ve probably heard of it. It’s one of the most common types of cyber attacks and users are constantly warned about its dangers. It’s so prevalent, in fact, that many cloud email providers (think Gmail and Yahoo!) provide an alert within any suspicious looking message that it may be a Phishing attempt. Commonly, users are warned about the dangers of clicking links in emails from senders they don’t…
ContinuedGet Your IT Winter Ready
As we approach the end of Fall, it’s time to begin looking forward to snow season. If we learned anything from the five consecutive snow storms in January and February earlier this year, it’s that every company needs to have its IT performing at its best to outlast Mother Nature. Unfortunately, this winter it may be more important than ever as the 2016 season is looking to be worse than 2015.…
ContinuedVisit Us At The Small Business Expo!
We’re excited to announce that this year Technical Support International will be exhibiting at the 2015 Small Business Expo! Join us on Thursday, October 8, 2015 at the Hynes Convention Center to learn more about TSI and what we can do to help your business. If you’ve ever wondered whether Managed Services makes sense for your company, if your organization has adequate cyber security measures in place, or if you…
ContinuedGet Your IT Hurricane Season Ready!
We’re right in the midst of hurricane season here in New England, and while the last couple of years have been relatively quiet in this region, Hurricane Sandy hit the area on October 29, 2012 causing billions of dollars’ worth of damage in the tri-state area, and closing businesses for days in the Northeast. In light of the reminder of just how powerful a storm can be, and the fact…
ContinuedSummer, IT’s Busiest Season
Ipswitch, a software company, recently released a study in which they unveiled the truth about the IT industry’s “summer vacation” – basically, it doesn’t exist. While many industries tend to hit a slow period during the summer due to vacations, IT service providers and managers actually have an increased workload during these months. The increase is due primarily to an influx of employees working remotely who need access to software…
ContinuedThe Best Password Saving Apps
One of the very first steps in ensuring your cyber security is to make certain that you’re using a strong password on any and all services that may contain or utilize personal information. You should also follow other password health guidelines, such as not using the same password for all of your services, including a capital letter and “special character,” and making sure your password doesn’t include identifying information such…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
