Cyber Security
Fortinet Firmware Advisory
Christopher Souza | CEO Fortinet has released a security advisory regarding a recently identified vulnerability affecting certain Fortinet devices configured to use FortiCloud Single Sign-On (SSO). While this issue has received attention, it’s important to note that there is currently no evidence of active exploitation, and Fortinet has already taken proactive mitigation steps to protect customers. What Fortinet Has Done To reduce potential exposure, Fortinet has taken proactive steps at…
Continued about Fortinet Firmware AdvisoryHow the Venezuela Operation Puts U.S. Cybersecurity at Higher Risk
Christopher Souza | CEO On January 3, 2026, U.S. forces conducted Operation Absolute Resolve to capture Venezuelan President Nicolás Maduro and his wife in Caracas. According to cyber professionals and public statements from U.S. leaders, cyber tools were used in advance of the raid to disrupt Venezuelan power and communications infrastructure. President Trump indicated that the city’s lights were “largely turned off due to a certain expertise that we have,”…
Continued about How the Venezuela Operation Puts U.S. Cybersecurity at Higher RiskSafe Shopping Holiday Tips for 2025
Christopher Souza | CEO The first week of December has come to a close and the holidays are rolling in fast. Shopping online means sharing a lot pf personal details including your name, address, email, phone number, and payment information that are all what cybercriminals have on their wish list. Plus, when you apply for loyalty programs or store credit cards, some companies can even store your social security number.…
Continued about Safe Shopping Holiday Tips for 2025Detecting Cyber Threats with Indicators of Compromise
Christopher Souza | CEO As cyber threats continue to evolve in sophistication and frequency, detecting intrusions early is critical. One of the most powerful tools in your cybersecurity arsenal is the ability to recognize and act on Indicators of Compromise (IOCs), which are signs that an attacker has breached or is actively attacking your environment. What Exactly Are IOCs? IOCs are digital artifacts or traces left behind when an adversary…
Continued about Detecting Cyber Threats with Indicators of CompromiseTSI Advisory: Protecting Your Network After the SonicWall Cloud Breach
Christopher Souza | CEO When your firewall vendor’s own cloud infrastructure is compromised, the risk extends directly to your network perimeter. That is exactly what many organizations are facing following the September 2025 breach of SonicWall’s MySonicWall cloud backup service. Backups of complete firewall configurations, including credentials, network rules, and other critical backup details were accessed during an attack on SonicWall’s internal systems. Technical Support International (TSI) detected signs of…
Continued about TSI Advisory: Protecting Your Network After the SonicWall Cloud BreachNew SonicWall SSL-VPN Threat: How to Respond and Stay Protected
Christopher Souza | CEO When it comes to cybersecurity, few things are more alarming than the discovery of a potential zero-day vulnerability in widely used infrastructure. That’s exactly the concern facing Gen 7 firewalls with SSL-VPN; SMA 100 series. Technical Support International (TSI) has learned of a flaw that could allow attackers to gain unauthorized access to certain SonicWall services and even bypass multi-factor authentication (MFA). While SonicWall has not…
Continued about New SonicWall SSL-VPN Threat: How to Respond and Stay ProtectedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place