Cyber Security
Securing Medical Devices Means Securing Networks
As the CEO of Technical Support International, I’m well aware of the increased presence of Internet of Things (IOT) technology within the healthcare and medical device industries where approximately 60% of such organizations have already introduced IoT devices into their facilities and by the end of the year, are predicted to climb to 89%. 73% of the businesses that already use these devices, are doing so for patient monitoring for…
ContinuedViewpoint: No business is too small to be cyber-targeted
As someone responsible for managing the marketing communications of one of the oldest and most experienced outsourced IT companies in New England, it’s safe to say I spend a lot of my time writing about the dangers that exist for small and medium-sized organizations in today’s climate. This is true both in terms of how these businesses are making meaningful use of their technology … but it’s especially true with…
ContinuedSQL Best Practices: What the Impending SQL 2008 End of Life Means For You
By now, you’re undoubtedly aware that Microsoft will stop supporting their Windows 7 operating system on January 14, 2020. Much has been written about the need to upgrade to something more updated before that time, as you not only run the risk of compatibility issues with your critical applications and systems, but inaction will also expose your business to a wide range of security threats that you would do well…
ContinuedShould You Upgrade From Windows 7: Threat and Vulnerability Management
At TSI, we have years of experience managing the computer systems for over 160 New England organizations. A large part of that job involves making sure that all software and operating systems being used by these businesses are up to date and secure – something that requires a proactive approach to the task to say the least. A lot of times, updates and software patches are the types of back…
ContinuedHow To Know If Network Pen Testing Is The Right Move
What is Penetration Testing? Penetration testing, also commonly referred to as ethical hacking or “pen testing” for short, is a process in which a business thoroughly tests its computer system, its network or its applications in an effort to uncover any and all security vulnerabilities that could potentially be exploited by someone with malicious intentions. This type of testing can either be automated and performed by specially designed computer software,…
ContinuedThe Danger Of The Insider Threat, And Why Biotech And Pharma Should Care
The cyber security situation for nearly every industry is a precarious one, but few have it worse right now than biotech and pharma. I see this first hand in the day to day work my company does protecting Pharmaceutical and Biotechnology businesses from cyber threats, but I’m not the only one witnessing a trend. According to one recent study, the pharmaceutical sector is the biggest target of criminals around the…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
