Cyber Security
Do You Have A Written Security Policy?
One of the myths among small business owners is that if a business moves its data to the cloud, you don’t need to worry about maintaining PCI Compliance; this is totally untrue. Even if your data is handled by a third party provider and in the cloud, you are still responsible for maintaining a security policy document and abide by PCI requirements. According to the PCI Council (American Express, Visa, MC,…
ContinuedRansomware and the Cryptolocker Threat
In the last few months there has been a lot of national attention on data breaches and infrastructure hacks that are affecting millions of people around the country. In addition to those hacks and breaches, another type of virus/data collection malware – Ransomware – has been making its rounds on the Internet, and it’s posing quite a problem for many individuals and companies. What Is Ransomware? Ransomware is a type…
ContinuedPreventative Maintenance Is Right For Every Company
There are two approaches to maintaining your IT infrastructure – cross your fingers and hope it all works out, and then shell out for assistance when a virus takes over or a computer crashes; or invest in resources that will keep everything running smoothly. Many medium to large sized companies have an IT department in place or have hired a company (like TSI!) to take care of their IT issues…
ContinuedCyber Readiness – What Is It And Why You Need It
At the World Economic Forum in January John Chambers, CEO of Cisco Systems, predicted that 2015 would be the worst year yet for cyber-attacks, following a year that saw attacks on Sony, Target, Home Depot, JP Morgan, and other large companies. In the wake of those major hacks, and Mr. Chambers’ bold prediction, the term “Cyber Readiness” has been bandied about the media and offices alike. It’s aiming to be…
ContinuedSpam Levels Lowest in Three Years
What the world could definitely use less of is spam and according to recent reports, it’s declining. Global spam is at the lowest it’s ever been since 2008. This could be a sign that spammers are beginning to look elsewhere like Facebook, Twitter and other social media sites. Here are the numbers: 70.5 percent of all email this year was spam, compared to 90+ percent from just a few years ago. From…
ContinuedMonitoring Internet Traffic at work
If you are small or mid-sized business owner, you need to read this: At TSI, 100% of all our clients have some type of full-time Internet connection, 99% use a hardware firewall and 8 % monitor Internet usage within their own organizations (which means 92% don’t!) It always amazes me that when I ask a business owner about how they monitor Internet usage, I often hear back “My people work very hard here,…
Continued- « Previous
- 1
- …
- 16
- 17
- 18
Categories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
