TSI's Information Technology Blog
Cyber Risk Alert: Windows 11 Security Concerns & Why You Shouldn’t Download the Update
Microsoft may have prompted you to download the latest Windows 11 update . Please do not download it, and advise your team as soon as possible to avoid it. Unfortunately, there may be a considerable risk with a number of security (eg. Sophos and Malwarebytes) and TSI network management tools not working and negatively impacting the security posture and network performance of your organization. In some cases, users may be…
ContinuedTSI Cyber Security: Apple’s Latest IOS Security Update
As part of this month’s security updates, we wanted to bring to your attention a number of critical Apple vulnerabilities impacting smartphone, iPad, Apple Watch and MacBook iOS to your attention: iOS 14.8 iPadOS 14.8 MacOS Bug Sur 11.6 WatchOS 7.6.2 If you or your team use these devices, we highly recommend that you routinely encourage them to regularly check for and apply the most recent updates for their Apple…
ContinuedWhat Microsoft’s Latest PrintNightmare Vulnerability Fix Has To Offer
Microsoft has since addressed the PrintNightmare vulnerability that impacts you and your team’s ability to print from your network without compromising your security posture. If TSI applies the latest Microsoft ‘fix’, users will be unable to print via the network, which would be a very serious issue for your organization. We understand your frustration with this problematic scenario, but we highly recommend that the PrintNightmare ‘fix’ be applied despite its…
ContinuedHow to Find Your NIST 800-171 & CMMC Requirements: A Comprehensive Guide to Determine Your Compliance Requirements from Your Primes & Clients
One of the most frequently asked questions I receive is: “How do I know if I need to be compliant with either the NIST 800-171 or CMMC frameworks?” The bottom line is that if you possess controlled unclassified information (CUI) then your organization will likely have to fulfill these compliance requirements- even if you are considered a commercial off the shelf (COTS) company if you’re required to do so by…
ContinuedSecurity Vulnerability: Microsoft’s PrintNightmare Remains Unpatched
As many of you may have heard, Despite Microsoft’s assertion that their latest update fixed last month’s PrintNightmare vulnerabilities, we’ve been informed that additional critical security issues remain that we wanted to bring to your attention. To learn more about how to safeguard your organization from the developing issue, please click here for the notification we sent to our clients detailing how to address it.
ContinuedWhat You’re Likely Missing about CMMC Compliance: Lessons from an MSP’s CMMC Readiness Review Assessment
We had a great webinar with our partners at NQA pertaining to our experience undergoing a CMMC 3 Readiness Review Assessment. We’ve conveniently recorded it HERE in case you missed it, so you can learn about some of the most overlooked aspects of a CMMC implementation including an overview of what it takes to become certification-ready. We hope our webinar helped address some of our audiences’ lingering questions about the assessment process…
ContinuedThe Cyber Vulnerability Rundown: Chrome Zero Day & Microsoft Printer
There are two new and one existing critical vulnerabilities that we wanted to bring to your attention that will require your approval or your users’ immediate action to remediate: Google Chrome Zero-Day Vulnerability. New 3rd and Continuing Microsoft Printer Vulnerabilities. The Google Chrome zero-day vulnerability presents an immediate threat to Google Chrome users that should be addressed immediately using the instructions below: On your computer, open Chrome (if it has…
ContinuedWe Don’t Learn From Our Mistakes: 2020’s Most Popular Passwords
After a series of high-profile breaches, we wanted to update an article we developed a few years ago about some of the disturbing trends we continue to see with end user password behaviors. It’s fair to assume that a strong password is one of the most important security tools that any user can employ to minimize the chances of a breach, but we unfortunately see that users oftentimes continue to…
ContinuedThe Future of Engineering: How AI Trends & Cybersecurity Are Defining the Industry
As someone who spends a lot of time working with technology leaders in the engineering industry, I’ve seen the state of IT in this field up close and personal. I’ve witnessed the types of issues that people are facing on a regular basis, and how catastrophic they can become if left unchecked. But I’ve also seen an incredible amount of potential as innovative and disruptive new technologies emerge on a…
ContinuedRecent Data Breach: Historic Credentials Leak
More often than ever, we are hearing about large-scale ransomware attacks with devastating effects. Today, we wanted to bring to your attention a recent password and credentials leak which is being described as the largest breach in history. This breach has leaked over 3.2 billion passwords and includes 26 million compromised account log-in credentials for a number of popular sites including Apple, Amazon, Facebook and Netflix. Learn more about the…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
