TSI's Information Technology Blog
Sophos Central Extends Support to Windows EOL Operating Systems
Microsoft has announced that effective February 1, 2022, it will no longer provide virus updates for the following end-of-life operating systems without the purchase of Sophos extended support. Server 2008 Windows 7 Linux CentOS 6 Linux CentOS 8 Linux Ubuntu 20.10 Linux Ubuntu 16.4 LTS Linux Ubuntu 12.4 Linux Redhat 6.8 Mac OS 10.14 Organizations that have a number of unsupported EOL systems will be impacted by this upcoming change.…
ContinuedCMMC 2.0 Changes and What They Mean to Your Organization’s Compliance Strategy
The announcement of CMMC 2.0 has garnered a lot of attention throughout the Defense Industrial Base (DIB). With that attention comes the anxiety of change and uncertainty, especially for both the DIB and their consultants who have already made considerable progress toward accomplishing their CMMC objectives. Although these changes seem daunting, it’s important to consider that most of these changes are simply a refinement of the existing CMMC requirements, rather…
ContinuedFour Ways vCISOs Help Avoid CMMC Compliance & Security Program Mistakes
If you operate within the U.S. defense industrial base (DIB), you’re likely well aware of the CMMC—and now the CMMC 2.0’s—compliance mandates, including the immediate and long-term impact they will present to your organization. Despite the challenges and steep costs associated with implementing a CMMC compliant environment, doing business with the Department of Defense (DoD) will require DIB contractors to adhere to this compliance framework, which is nothing short of…
Continued5 CMMC 2.0 Updates You Need to Know!
As you may have heard, the recent changes to the CMMC requirements have caused many DIB contractors to rethink their compliance implementation strategies so we wanted to take this opportunity to help clarify some of the most common questions our own clients have been asking as well as share some critical- and not so obvious- insights to help steer your organization in the right direction during this provisional review period.…
ContinuedTSI Joins Exostar’s CMMC Partner Network to Help DIB Companies Navigate Evolving DoD Cybersecurity Requirements
TSI’s Clients to Benefit from Exostar’s Robust, Easy-to-Use DoD Cybersecurity Compliance Products FOXBORO MA-June 9th, 2022: TSI, an IT Managed Services (MSP) and Managed Security Service Provider (MSSP), today announced it has joined Exostar’s CMMC partner network to help DoD contractors navigate and fulfill their Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity compliance requirements, including NIST 800-171 and CMMC 2.0. By leveraging Exostar’s powerful application, Certification Assistant, TSI will be…
ContinuedWhat To Do: Apache’s Log4j Vulnerability
Apache’s Log4j is a powerful open-source logging library used by millions of developers worldwide. However, Apache recently discovered an extremely dangerous vulnerability that could leave your applications and servers vulnerable to attack! In this blog post, we will explain what the Log4j vulnerability is, and how you can protect your organization from being exploited. We will also provide instructions on how to upgrade your Log4j installation. So don’t wait –…
ContinuedJonas: Target of a Security Breach
We wanted to bring to your attention that Jonas has recently been the target of a security breach. The breach appears not to pose any immediate risk at present, but it may become an issue down the road, so we’re proactively reviewing updates from JONAS to address the potential impact. In short, we wanted to take the opportunity to address any potential concerns you currently may have and inform you…
ContinuedGoDaddy’s Data Breach Exposes 1.2M Customers
There has been a data breach involving 1.2 million GoDaddy customers that we would like to bring your attention to. This breach has only impacted organizations using GoDaddy’s Managed WordPress service, so if your organization subscribes to this service, it’s absolutely critical that you work with your website administrator to reset your passwords as soon as possible to avoid any further data loss or exposure to your site. GoDaddy disclosed…
ContinuedMicrosoft’s PrintNightmare Vulnerability Finally Patched!
We are happy to inform you that the PrintNightmare vulnerability has now been resolved. Once the patch is checked by our team and they begin applying it during the pre-scheduled maintenance window, you will be able to access print services at any time throughout the day moving forward. In order for this patch to be applied, it’s absolutely critical that your users reboot their machines- not just shut them down-…
ContinuedCreating and Managing a Sustainable CMMC Compliance Program
In partnership with Exostar, TSI held a successful webinar on the topic of “Creating and Managing a Sustainable CMMC Compliance Program”. Our webinar was recorded HERE, allowing you to get an understanding of our approach to helping businesses to achieve and maintain a successful cybersecurity program toward CMMC compliance. Furthermore, we have addressed topics such as policy development and documentation, IT CMMC requirements, engaging with CMMC 3 certificate ready RPO/Service…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
