Cyber Security
What Is a Common Indicator of a Phishing Attempt and How to Avoid Getting Hooked
Phishing season is in full swing, with a more sophisticated and increasingly deceptive hacking methodology that can hook even the savviest of us into providing confidential information. It’s why we found it fitting to round up a few examples of the most common and prevalent attacks we have faced this year. We also wanted to demonstrate ways to identify and avoid putting you or your company’s sensitive data at risk.
ContinuedTSI Business Success Stories: Rebecca’s Cafe
TSI recently completed a server replacement and backup solution for a bustling client, Rebecca’s Café. Arthur Lemieux, one of our project managers, along with a team of highly skilled engineers, managed the initiative while ensuring an extremely busy client experienced not only a seamless transition, but minimal downtime. Challenge: Rebecca’s Café has had tremendous growth, particularly within its event planning and catering services. As with many growing businesses, technology needs can change;…
ContinuedFive Tips For Ensuring Cybersecurity When Online Shopping
Believe it or not – we’re on our way to the holiday season, full steam ahead! Whether or not you find yourself giving gifts at this time of year, you probably do a bit of online shopping. Who doesn’t? Black Friday sales have begun creeping earlier and earlier every year, and retailers capitalize on workers sitting at their desks the Monday after Thanksgiving by putting on some pretty enticing Cyber…
ContinuedThe Danger of Phishing
Phishing – you’ve probably heard of it. It’s one of the most common types of cyber attacks and users are constantly warned about its dangers. It’s so prevalent, in fact, that many cloud email providers (think Gmail and Yahoo!) provide an alert within any suspicious looking message that it may be a Phishing attempt. Commonly, users are warned about the dangers of clicking links in emails from senders they don’t…
ContinuedDo You Have A Written Security Policy?
One of the myths among small business owners is that if a business moves its data to the cloud, you don’t need to worry about maintaining PCI Compliance; this is totally untrue. Even if your data is handled by a third party provider and in the cloud, you are still responsible for maintaining a security policy document and abide by PCI requirements. According to the PCI Council (American Express, Visa, MC,…
ContinuedRansomware and the Cryptolocker Threat
In the last few months there has been a lot of national attention on data breaches and infrastructure hacks that are affecting millions of people around the country. In addition to those hacks and breaches, another type of virus/data collection malware – Ransomware – has been making its rounds on the Internet, and it’s posing quite a problem for many individuals and companies. What Is Ransomware? Ransomware is a type…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- CMMC
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST/CMMC
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place