Databases Need Upgrades, Too: What the Impending SQL EOL Means to You

By Jeremy Louise | February 26th, 2019 | Network Security

By now, you’re undoubtedly aware that Microsoft will stop supporting their Windows 7 operating system on January 14, 2020. Much has been written about the need to upgrade to something more updated before that time, as you not only run the risk of compatibility issues with your critical applications and systems, but inaction will also … Continued

What Windows 7 End of Life Means and Why Upgrading is Critical to Your Business

By Chris Souza | February 11th, 2019 | Network Security

At TSI, we have years of experience managing the computer systems for over 160 New England organizations. A large part of that job involves making sure that all software and operating systems being used by these businesses are up to date and secure – something that requires a proactive approach to the task to say … Continued

Do I Need a Pen Test? How To Know If Pen Testing Is The Right Move

By Jeremy Louise | January 14th, 2019 | Network Security

What is Penetration Testing? Penetration testing, also commonly referred to as ethical hacking or “pen testing” for short, is a process in which a business thoroughly tests its computer system, its network or its applications in an effort to uncover any and all security vulnerabilities that could potentially be exploited by someone with malicious intentions. … Continued

10 Questions to Validate Your Security Strategy

By Jeremy Louise | December 3rd, 2018 | Governance & IT Compliance Network Security

There’s so much information out there about hacks, threats and cyber security in general that it can be natural to feel overwhelmed and fatigued. You understand that the consequences of leaving your business exposed are severe – but at the same time, you don’t know where to begin to address them. You may even have … Continued

Controlling the Costs of IT Security: Why It’s a Lot Easier Than You Think

By Jeremy Louise | September 12th, 2018 | Network Security

One of the common themes that’s permeated a lot of the meetings I’ve been having with both current and prospective clients lately can all be summed up in a single word: security. These chats may not, however, be taking the shape you probably think they are. Yes, cyber security is critical and it’s an issue … Continued

Infected USB Drives Handed Out at Data Security Event

By Roger Murray | January 19th, 2018 | Network Security

During a recent data security expo hosted by Taiwan’s Presidential Office, 54 malware-infested thumb drives were handed out to the public by the Criminal Investigation Bureau. These infected USB sticks were among the 250 drives the bureau gave to winners of a game about cybersecurity knowledge at their exhibit.

Unusual Ransomware Strain Encrypts Cloud Email In Real-Time

By Roger Murray | January 16th, 2018 | Network Security

A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time.  A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure. 

Top 25 Most Popular Passwords of 2017

By Roger Murray | December 27th, 2017 | Network Security

Each year, researchers from SplashData revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year.  Despite the continued warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information.

Google Partners with ESET to Provide Malware Detection for Chrome

By Scott Evans | November 2nd, 2017 | Network Security

Chrome Cleanup uses ESET technology to identify and eradicate suspicious or unwanted software on your Windows computer.  The tool operates in the background, with no slowdowns or interruptions to the user with three easy steps.

Four Ways Ransomware Can Destroy Your Backups

By Chris Souza | September 14th, 2017 | Network Security

I just found a very interesting blog post by Jerome Wendt, President & Lead Analyst of DCIG, Inc., an independent storage analyst and consulting firm. He started out with “The prevailing wisdom is that if you back up your data you can recover from a ransomware attack. While this premise generally holds true, simply backing … Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979