Managed Services
Fortinet Firmware Advisory
Christopher Souza | CEO Fortinet has released a security advisory regarding a recently identified vulnerability affecting certain Fortinet devices configured to use FortiCloud Single Sign-On (SSO). While this issue has received attention, it’s important to note that there is currently no evidence of active exploitation, and Fortinet has already taken proactive mitigation steps to protect customers. What Fortinet Has Done To reduce potential exposure, Fortinet has taken proactive steps at…
Continued about Fortinet Firmware AdvisoryDetecting Cyber Threats with Indicators of Compromise
Christopher Souza | CEO As cyber threats continue to evolve in sophistication and frequency, detecting intrusions early is critical. One of the most powerful tools in your cybersecurity arsenal is the ability to recognize and act on Indicators of Compromise (IOCs), which are signs that an attacker has breached or is actively attacking your environment. What Exactly Are IOCs? IOCs are digital artifacts or traces left behind when an adversary…
Continued about Detecting Cyber Threats with Indicators of CompromiseTSI Advisory: Protecting Your Network After the SonicWall Cloud Breach
Christopher Souza | CEO When your firewall vendor’s own cloud infrastructure is compromised, the risk extends directly to your network perimeter. That is exactly what many organizations are facing following the September 2025 breach of SonicWall’s MySonicWall cloud backup service. Backups of complete firewall configurations, including credentials, network rules, and other critical backup details were accessed during an attack on SonicWall’s internal systems. Technical Support International (TSI) detected signs of…
Continued about TSI Advisory: Protecting Your Network After the SonicWall Cloud BreachNew SonicWall SSL-VPN Threat: How to Respond and Stay Protected
Christopher Souza | CEO When it comes to cybersecurity, few things are more alarming than the discovery of a potential zero-day vulnerability in widely used infrastructure. That’s exactly the concern facing Gen 7 firewalls with SSL-VPN; SMA 100 series. Technical Support International (TSI) has learned of a flaw that could allow attackers to gain unauthorized access to certain SonicWall services and even bypass multi-factor authentication (MFA). While SonicWall has not…
Continued about New SonicWall SSL-VPN Threat: How to Respond and Stay ProtectedRansomware Hits SonicWall Firewalls: Gen-7 SSLVPN Exploits and How to Mitigate
Christopher Souza | CEO Over the past several days, cybersecurity researchers like our trusted partners at Arctic Wolf Security, have identified a sharp rise in targeted cyberattacks against SonicWall Gen 7 firewalls with SSLVPN enabled. These attacks aren’t just speculative, but active, coordinated campaigns that have already resulted in ransomware deployments across multiple organizations. SonicWall has confirmed that this activity is linked to the Akira ransomware group. This is a…
Continued about Ransomware Hits SonicWall Firewalls: Gen-7 SSLVPN Exploits and How to MitigateCritical Microsoft SharePoint Vulnerability: Act Now or Risk Compromise
Christopher Souza | CEO In today’s high-stakes digital world, staying on top of cybersecurity threats is a vital part of your business’ everyday operations. It’s survival of the fittest. Over the weekend, a dangerous vulnerability in Microsoft SharePoint Server came under active exploitation, compromising at least 29 organizations already. But that number is climbing. If you’re still running on-premises SharePoint servers, this is not a drill. Here’s what’s happening, who’s…
Continued about Critical Microsoft SharePoint Vulnerability: Act Now or Risk CompromiseCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place