Cyber Security
TSI Advisory: Protecting Your Network After the SonicWall Cloud Breach
Christopher Souza | CEO When your firewall vendor’s own cloud infrastructure is compromised, the risk extends directly to your network perimeter. That is exactly what many organizations are facing following the September 2025 breach of SonicWall’s MySonicWall cloud backup service. Backups of complete firewall configurations, including credentials, network rules, and other critical backup details were accessed during an attack on SonicWall’s internal systems. Technical Support International (TSI) detected signs of…
ContinuedNew SonicWall SSL-VPN Threat: How to Respond and Stay Protected
Christopher Souza | CEO When it comes to cybersecurity, few things are more alarming than the discovery of a potential zero-day vulnerability in widely used infrastructure. That’s exactly the concern facing Gen 7 firewalls with SSL-VPN; SMA 100 series. Technical Support International (TSI) has learned of a flaw that could allow attackers to gain unauthorized access to certain SonicWall services and even bypass multi-factor authentication (MFA). While SonicWall has not…
ContinuedRansomware Hits SonicWall Firewalls: Gen-7 SSLVPN Exploits and How to Mitigate
Christopher Souza | CEO Over the past several days, cybersecurity researchers like our trusted partners at Arctic Wolf Security, have identified a sharp rise in targeted cyberattacks against SonicWall Gen 7 firewalls with SSLVPN enabled. These attacks aren’t just speculative, but active, coordinated campaigns that have already resulted in ransomware deployments across multiple organizations. SonicWall has confirmed that this activity is linked to the Akira ransomware group. This is a…
ContinuedCritical Microsoft SharePoint Vulnerability: Act Now or Risk Compromise
Christopher Souza | CEO In today’s high-stakes digital world, staying on top of cybersecurity threats is a vital part of your business’ everyday operations. It’s survival of the fittest. Over the weekend, a dangerous vulnerability in Microsoft SharePoint Server came under active exploitation, compromising at least 29 organizations already. But that number is climbing. If you’re still running on-premises SharePoint servers, this is not a drill. Here’s what’s happening, who’s…
ContinuedNavigating the Windows 10 Sunset: Time to Prepare for the October Deadline
Christopher Souza | CEO Microsoft has announced that Windows 10 support will end on October 14, 2025. After this date, devices still running Windows 10 will no longer receive vital security patches, feature updates, or technical support, leaving your entire organization vulnerable to exploits. Why Organizations Must Upgrade As the sun sets on Windows 10, businesses need to act. Here’s why upgrading to Windows 11 is critical: Enhanced Security After…
ContinuedCountdown to CMMC: What Defense Contractors Need to Know Before the Rule Is Finalized
Christopher Souza | CEO Summer might be right around the corner, but defense contractors can’t afford to put compliance on the back burner. The Department of Defense (DoD) is in the final stages of releasing the long-anticipated Cybersecurity Maturity Model Certification (CMMC) rule under 48 CFR, and according to Deputy DoD CIO David McKeown, the rule is now under review by the DFARS Regulatory Control Officer (RCO)—the final internal DoD…
ContinuedCategories
- Backup & Disaster Recovery
 - Business Operations
 - Case Studies
 - Cloud Services
 - Cyber Security
 - Employee Spotlight
 - Finance & Budgeting
 - Glossary Term
 - Governance & IT Compliance
 - Managed Services
 - Mobile Device Management
 - Network Infrastructure
 - NIST 800-171 & CMMC 2.0
 - PCI
 - Podcast
 - Project Management
 - TSI
 - Uncategorized
 - vCIO
 
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place