Cyber Security
GSA Stars III Contractors Face New Rules: CMMC DoD
Critical Update for GSA Stars III Contractors; New IT Compliance Requirement Mandates Organizations that are listed under the GSA are companies that work with the government, outside of the DoD. It was recently announced (GSA STARS III CMMC Release) that- effectively immediately- GSA companies may have to begin adhering to the CMMC if required within their contracts. Although the majority of them falling under the CMMC 1 requirements, the CMMC…
ContinuedWe’re Updating TSI’s Managed IT Support Services: Security and Compliance Notification
As today’s cybersecurity threats increase in frequency, complexity, and impact, we’ve had to adapt our IT services model to address these very areas of focus. Over the last few years, this evolution has led TSI toward becoming a full-fledged Managed Security Services Provider (MSSP) that can not only help address your cybersecurity gaps but also help achieve our clients’ compliance requirements. As your trusted IT partner, it’s of the utmost…
ContinuedVulnerable Software: A 17-Year-Old Vulnerability Was Just Discovered in Windows Server
Meet SIGRed First “discovered” in July of 2020, SIGRed is a very particular type of vulnerability in the Windows DNS Server environment called an RCE, or remote code execution. This means that it can be triggered by an attacker with little more than a malicious DNS response. Believe it or not, it’s actually been around for 17 years and impacts all Microsoft O/S from Server 2003 all the way up…
ContinuedHow to Web Conference Safely: Cybersecurity Risk Management
Over the last few weeks, more and more of our clients at TSI have quickly become comfortable with video and web conferencing solutions like Zoom – which is terrific. Still, we wanted to take this opportunity to remind you to stay up-to-date on all of the scams and vulnerabilities that are associated with these platforms, many of which are growing more common by the day. So many of these communications…
ContinuedProtecting Yourself Online: How to Beat Covid-19 Scammers
According to data recently released by the Federal Trade Commission, consumers have already lost about $5.85 million to various Coronavirus related schemes ALONE and likely don’t include those that haven’t been reported to the agency. With a costly $600 average loss per instance, it’s a seemingly lucrative tactic that does not appear to be going away. Unfortunately, it should come as no surprise that there is no shortage of malicious actors…
ContinuedProtecting Against IoT Vulnerabilities: IoT Security Solutions in 2020
As someone who has been in the technology business for over 25 years, it’s safe to say that I’ve seen a lot of so-called tech trends come and go. But one that I find truly exciting is also one that is very much here to stay: IoT, also known as, the Internet of Things. In no uncertain terms, the implications of IoT are enormous. We’re already seeing them play out…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
