TSI's Information Technology Blog
HAVE ITAR DATA AND CMMC REQUIREMENTS? READ THIS TODAY: MEASURE TWICE, CUT ONCE!
In the world of defense industry regulations, ITAR and CMMC are two important sets of regulatory requirements that many within the defense industrial base need to adhere to. Although both regulations are distinct and tailored to their respective purposes, many companies dealing with ITAR-controlled items or information will need to comply with CMMC requirements to do business with the DoD, which adds an additional layer of complexity- and potential costs-…
ContinuedStop Relying on NIST 800-171 Self-Assessments: 5 Reasons They’re (Probably) Wasting Your Time
As a CMMC Registered Practitioner Organization (RPO) with decades of cybersecurity experience, we have conducted countless assessments for organizations to help them address their compliance obligations and consistently notice that the vast majority of the organizations that have conducted self-assessments are strikingly off mark, leading to frustration, considerable time loss, and the unnecessary expenditure of valuable resources. While self-assessments may seem like a cost-effective way to evaluate compliance with the…
ContinuedEnclaves for NIST 800-171 Compliance & CMMC? Not So Fast: 5 Things To be Aware of When Considering an Enclave Solution
In your quest as a Defense Industrial Base (DIB) contractor to tackle the intricate aspects of NIST 800-171 and CMMC compliance, you’ve likely been bombarded with a plethora of marketing claims promising swift, ‘silver bullet’ compliance solutions alleviating your woes. This is understandably enticing for small to medium-sized DIBs grappling between successfully addressing the complex layers of these extensive compliance prerequisites and the cost of implementing them. However, many DIBS…
ContinuedSecurity Risk: .Mov and .Zip domains can lead to malware
We want to bring your attention to a concerning development involving the use of new top-level domains (TLDs) introduced by Google. Specifically, threat actors are leveraging TLDs such as .mov and .zip to target organizations, posing a significant security risk. The Deceptive Nature of .mov and .zip Domains: The primary concern lies in the fact that .mov and .zip are widely recognized file extensions for internet-shared files. Exploiting this familiarity,…
ContinuedEmployee Spotlight – Derek Choun
We are thrilled to introduce our newest addition to the TSI team, Derek Choun, who has joined our managed services department as an IT Engineer. Derek has quickly emerged as a standout in the field of IT, driven by his insatiable thirst for knowledge and unwavering curiosity. TSI considers itself incredibly fortunate to have Derek onboard, and we eagerly anticipate the valuable contributions he will make to our company’s growth.…
Continued5 Most Important Questions to Ask your SIEM Provider & When You Should Probably Re-Evaluate Your Current Solution
First Things First: What is a SIEM? A SIEM (Security Information and Event Management) is a software solution that collects and analyzes security data from multiple sources in real-time to detect and respond to security threats. It aggregates and correlates logs and alerts generated from different sources, such as network devices, servers, and applications, and uses machine learning algorithms to identify patterns of suspicious behavior or anomalies. SIEMs also provide…
ContinuedTraveling for Memorial Day? 5 Cybersecurity Tips to Keep You & Your Family Safe this Summer!
Traveling for Memorial Day? 5 Cybersecurity Tips to Keep You & Your Family Safe this Summer! Cybersecurity is a crucial aspect of our lives that we cannot afford to neglect especially when our guard is down on vacation! While vacations are meant to be a time to relax and unwind, they can also present opportunities for cyber criminals to exploit our vulnerabilities. In this article, we will provide you with…
ContinuedTSI Employee Spotlight: Mike Sutcliffe
We are extremely pleased to introduce our latest team member, Mike Sutcliffe as an IT Security Specialist . Mike brings many years of hands-on IT experience with deep knowledge in systems administration, networking, and security. Most recently and since 2012, Mike held a Lead IT role where his daily responsibilities involved end-to-end IT including installations, problem resolution, and administration. In addition to Mike’s IT acumen, he has worked within fast-paced managed…
ContinuedHow To Choose a Managed Services Provider (MSP)
While many managed service providers advertise their technical skills and certifications, potential customers should analyze their core values as well. Technical skills are relatively constant throughout the market but focusing on teamwork and continuous improvement is rare and should greatly influence your vendor decision. The truth is, all managed services providers (MSP) are far more alike than people realize – ourselves included. They all use the same- if not identical-…
ContinuedWindows 10 (v.21H2) – End of Life
Beginning June 13th, Windows 10 (v. 21H2) will be considered End of Life (EOL) and will no longer receive critical security patches. TSI started applying this update (v. 22H2) to workstations on Saturday, April 1st so they could continue receiving critical security patches and avoid the potential exploitation by vulnerabilities targeting non-updated machines. This updated was pushed to TSI clients during normal, prescheduled patching and maintenance windows, but for…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
