TSI's Information Technology Blog
Employee Spotlight – Derek Choun
We are thrilled to introduce our newest addition to the TSI team, Derek Choun, who has joined our managed services department as an IT Engineer. Derek has quickly emerged as a standout in the field of IT, driven by his insatiable thirst for knowledge and unwavering curiosity. TSI considers itself incredibly fortunate to have Derek onboard, and we eagerly anticipate the valuable contributions he will make to our company’s growth.…
Continued5 Most Important Questions to Ask your SIEM Provider & When You Should Probably Re-Evaluate Your Current Solution
First Things First: What is a SIEM? A SIEM (Security Information and Event Management) is a software solution that collects and analyzes security data from multiple sources in real-time to detect and respond to security threats. It aggregates and correlates logs and alerts generated from different sources, such as network devices, servers, and applications, and uses machine learning algorithms to identify patterns of suspicious behavior or anomalies. SIEMs also provide…
ContinuedTraveling for Memorial Day? 5 Cybersecurity Tips to Keep You & Your Family Safe this Summer!
Traveling for Memorial Day? 5 Cybersecurity Tips to Keep You & Your Family Safe this Summer! Cybersecurity is a crucial aspect of our lives that we cannot afford to neglect especially when our guard is down on vacation! While vacations are meant to be a time to relax and unwind, they can also present opportunities for cyber criminals to exploit our vulnerabilities. In this article, we will provide you with…
ContinuedTSI Employee Spotlight: Mike Sutcliffe
We are extremely pleased to introduce our latest team member, Mike Sutcliffe as an IT Security Specialist . Mike brings many years of hands-on IT experience with deep knowledge in systems administration, networking, and security. Most recently and since 2012, Mike held a Lead IT role where his daily responsibilities involved end-to-end IT including installations, problem resolution, and administration. In addition to Mike’s IT acumen, he has worked within fast-paced managed…
ContinuedHow To Choose a Managed Services Provider (MSP)
While many managed service providers advertise their technical skills and certifications, potential customers should analyze their core values as well. Technical skills are relatively constant throughout the market but focusing on teamwork and continuous improvement is rare and should greatly influence your vendor decision. The truth is, all managed services providers (MSP) are far more alike than people realize – ourselves included. They all use the same- if not identical-…
ContinuedProtect Your Systems from CVE-2023-23397: A Critical Vulnerability in Outlook
Earlier this week, our TSI Managed Services team addressed a critical vulnerability (CVE-2023-23397) impacting Outlook for our clients. Learn more about the vulnerability and how to protect your systems below. What is CVE-2023-23397 – the CVE impacting Outlook? Microsoft disclosed a critical vulnerability to Outlook called CVE-2023-23397 on March 14 as part of the March Patch Tuesday fixes. This vulnerability is considered a significant threat, with a rating of 9.8…
ContinuedCritical Veeam Backup Solution Vulnerability: How to Protect Your Data
What is the VEEAM vulnerability? Veeam, a backup data solution, has warned its customers to fix a severe security problem that affects its Backup & Replication software. This issue (CVE-2023-27532) was found in February by a security researcher named Shanigen and it affects all versions of Veeam Backup & Replication (VBR). The vulnerability allows people who aren’t authorized to access the software to get into the backup system by obtaining…
ContinuedNew Microsoft Multifactor Authentication (MFA) Method
At Technical Support International (TSI), we understand the importance of keeping your personal and business data secure. That’s why Microsoft implemented a new Multifactor Authentication (MFA) method to help protect your accounts from unauthenticated access. What is Multifactor Authentication? Multifactor Authentication is a security feature that requires you to provide two or more forms of identification before accessing your account. With MFA, even if someone gets hold of your password,…
ContinuedDon’t Let The Recent OneNote Exploit Threaten Your Cybersecurity
We have noticed that malware threat actors have found an exploit within OneNote and we’ve observed a significant increase in the number of malicious files delivered and opened via OneNote email attachments. Unlike malicious Word and Excel files, OneNote malware and the associated infected files do not require the security prompt asking the end-user to allow macros, thus increasing the chances of unknowingly running the malicious executable. What you can do…
ContinuedThe #1 Top Cybersecurity Threat from 2022 & How to Protect Your Business in 2023
With 2023 now underway, we wanted to share what we believe to be the two most significant cybersecurity threats to your organization: Phishing attempts and users without routine end user cybersecurity awareness training. Every breach that we saw in 2022 from our clients was from phishing. Unfortunately, cyber threat actors are always one step ahead, and the way that email traverses from one server to another, is defined by standards…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
