TSI's Information Technology Blog
TSI Employee Spotlight: Logan Abell
An active Air Force veteran with over six years of service as a Cyber Systems Operator, Logan has spent time defending critical IT environments within the DoD and the Department of Health. His background includes Network Design, System Administration, Compliance Integration, and Virtualization. Further enriching his credentials is a certification in CompTIA Security+ and a Cybersecurity degree from Champlain College, grounding his hands-on experience with a solid academic foundation. Off…
ContinuedAction Required for Applications Using Azure Storage Services
Changes are coming that may impact applications that use Azure Storage Services! These types of applications rely on intermediate TLS certifications, which are scheduled to expire in June 2024. This is a result of the phasing out of “Certificate Pinning”, a process in which client applications explicitly specify acceptable certificate authorities. Thanks to evolving security practices, this is no longer considered a best practice. To prepare for this expiration, Microsoft…
ContinuedTSI Employee Spotlight: Joey Ebraico
We’re excited to introduce Joey Ebraico, a website and graphic designer joining the team as our Digital Marketing Coordinator. With an enthusiasm for all things design, Joey brings creativity and new perspective to our marketing initiatives. We’re excited to have him as part of our team and look forward to achieving great things together! 1. Tell us what inspired you to get into the IT/cyber-security industry? After working extensively with…
ContinuedStaying Secure While Shopping Online and In-Person During the Holidays
A Comprehensive Cybersecurity Guide The holiday season is nearly upon us, a time filled with joy and festivities but also a period when cybercriminals are especially active in targeting online shoppers. Cybercriminals primarily target victims during this period through social media platforms (41%), third-party websites (35%), emails (32%), phone calls (28%), and text messages (26%) and on average, victims of online shopping scams lose an average of $1500 during the…
ContinuedTSI Employee Spotlight: Kathy Caroon
We’re extremely excited to welcome back Kathy Carron! Kathy is returning to TSI after about a year and a half break. During that time, she worked as a Salesforce CRM Administrator as well as an Account Manager. Kathy is from the Worcester area and has been in the IT industry for about 8 years. Kathy is looking forward to re-entering TSI and meeting her TSI clients! In the past, her…
ContinuedApple Users! New Vulnerabilities Being Exploited
In today’s digital age, where our lives are intertwined with technology, safeguarding our digital presence has become paramount. We’re here to raise the alarm regarding critical security vulnerabilities that have emerged within Apple products, vulnerabilities that are actively being exploited. Your devices and security are at stake, and it’s our responsibility to keep you informed and protected. On September 7, 2023, Apple released emergency security updates addressing two vulnerabilities CVE-2023-41064:…
ContinuedMicrosoft’s Important Update On MFA & SSPR Settings Change
Today we want to bring your attention to an important update from Microsoft regarding their authentication methods for Multi-Factor Authentication (MFA) and Self Service Password Reset (SSPR). As technology continues to evolve, ensuring the security of your organization’s sensitive data becomes increasingly crucial. Microsoft has recently announced a strategic shift away from legacy authentication methods and is introducing a new, significantly more secure platform for authentication. This change is set…
ContinuedThe 5 Most Important Questions to Ask your SIEM Provider & When You Should Probably Re-Evaluate Your Current Solution
First Things First: What is a SIEM? A SIEM (Security Information and Event Management) is a software solution that collects and analyzes security data from multiple sources in real-time to detect and respond to security threats. It aggregates and correlates logs and alerts generated from different sources, such as network devices, servers, and applications, and uses machine learning algorithms to identify patterns of suspicious behavior or anomalies. SIEMs also provide…
ContinuedHAVE ITAR DATA AND CMMC REQUIREMENTS? READ THIS TODAY: MEASURE TWICE, CUT ONCE!
In the world of defense industry regulations, ITAR and CMMC are two important sets of regulatory requirements that many within the defense industrial base need to adhere to. Although both regulations are distinct and tailored to their respective purposes, many companies dealing with ITAR-controlled items or information will need to comply with CMMC requirements to do business with the DoD, which adds an additional layer of complexity- and potential costs-…
ContinuedStop Relying on NIST 800-171 Self-Assessments: 5 Reasons They’re (Probably) Wasting Your Time
As a CMMC Registered Practitioner Organization (RPO) with decades of cybersecurity experience, we have conducted countless assessments for organizations to help them address their compliance obligations and consistently notice that the vast majority of the organizations that have conducted self-assessments are strikingly off mark, leading to frustration, considerable time loss, and the unnecessary expenditure of valuable resources. While self-assessments may seem like a cost-effective way to evaluate compliance with the…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place