Business Operations
Managed IT services: MSPs Could Be Giving Clients Ransomware
A part of my week here at TSI is always spent wading through news stories to stay ahead of all the latest trends and best practices in our industry. After all, how can I provide clients with the most complete, accurate and actionable information to work from if I don’t have access to that data myself? Most of the time, the trends I spend so much time researching fall squarely…
ContinuedWhat Is ISO 27001?: Information Security Certifications
This article was written with contributions from Timonthy Woodcome, director of NQA, a leading Global Certifications Body as well as the technical staff here at Technical Support International. Also officially known as ISO/IEC 27001:2013, ISO 27001 is a specification for a set of policies and procedures that outlines all of the legal, physical and even technical controls that make up a business’ information risk management process. This type of framework…
ContinuedFirewall Management: Log Monitoring and Auditing Basics
As part of my role at TSI, I meet with a wide range of different businesses. More often than not, when I ask about their current log monitoring efforts, people aren’t even sure what this really does, and are surprised to find how unequipped they’re cyber security strategy is. In this piece, I’d like to go into detail on what firewall log monitoring is, what it does and why it’s…
ContinuedWhat You Need to Know About the Government Revisiting Internet of Things Regulation
I was having lunch with one of my long-term MSP clients the other day, and we were discussing what the next ten years of his business might look like in relation to the technological advancements taking place all around us. He was particularly excited about the implications of the Internet of Things (or “IoT” for short), and with good reason. If you had to single out a trend that has…
ContinuedCyber Security Defense: Give Your Employees Vishing and Phishing Training
As someone who handles a lot of IT and cyber security-related fixtures for small businesses every day, I spent a lot of my time on the phone talking to clients about all of the latest attacks. It happened again just the other day – one of my long-term clients called me up and wanted to discuss a story he’d read that was giving him concern. The first was the case…
ContinuedCybersecurity Defense: IT Spring Cleaning Checklist
As someone who quite literally grew up in the managed services industry, I believe that the importance of spring cleaning when it comes to your IT infrastructure is something that cannot be overstated enough. A lot of other people seem to share the same opinion, as evidenced by the plethora of “X Things You NEED to Do When Spring Cleaning Your IT Systems” articles my clients keep sending me. On…
ContinuedCategories
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
