Business Operations
What Do I Need To Do Before Upgrading To Windows 10?
Ten years. That’s how long it has been since myself and my colleagues at TSI had to inform our clients that their beloved Windows XP machines would be going away. Once Microsoft had announced that it was ending support for that particular operating system, it represented a fundamental shift in the way that organizations managed and ultimately planned their technology strategies- up to a point. In my experience, there were…
ContinuedManaged IT services: MSPs Could Be Giving Clients Ransomware
A part of my week here at TSI is always spent wading through news stories to stay ahead of all the latest trends and best practices in our industry. After all, how can I provide clients with the most complete, accurate and actionable information to work from if I don’t have access to that data myself? Most of the time, the trends I spend so much time researching fall squarely…
ContinuedWhat Is ISO 27001?: Information Security Certifications
This article was written with contributions from Timonthy Woodcome, director of NQA, a leading Global Certifications Body as well as the technical staff here at Technical Support International. Also officially known as ISO/IEC 27001:2013, ISO 27001 is a specification for a set of policies and procedures that outlines all of the legal, physical and even technical controls that make up a business’ information risk management process. This type of framework…
ContinuedFirewall Management: Log Monitoring and Auditing Basics
As part of my role at TSI, I meet with a wide range of different businesses. More often than not, when I ask about their current log monitoring efforts, people aren’t even sure what this really does, and are surprised to find how unequipped they’re cyber security strategy is. In this piece, I’d like to go into detail on what firewall log monitoring is, what it does and why it’s…
ContinuedWhat You Need to Know About the Government Revisiting Internet of Things Regulation
I was having lunch with one of my long-term MSP clients the other day, and we were discussing what the next ten years of his business might look like in relation to the technological advancements taking place all around us. He was particularly excited about the implications of the Internet of Things (or “IoT” for short), and with good reason. If you had to single out a trend that has…
ContinuedCyber Security Defense: Give Your Employees Vishing and Phishing Training
As someone who handles a lot of IT and cyber security-related fixtures for small businesses every day, I spent a lot of my time on the phone talking to clients about all of the latest attacks. It happened again just the other day – one of my long-term clients called me up and wanted to discuss a story he’d read that was giving him concern. The first was the case…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place