Resources

W ebinars

Strategizing your CMMC plan of action

Alongside our partner CyberSaint, we will discuss helpful strategies that will prepare you for a successful CMMC implementation including:

webinar-img
  • Determining your appropriate level for CMMC compliance, and what is required of your organization

  • What is involved in a gap assessment for CMMC, including system scanning, data analysis, and report development

  • Remediation development tips including how to approach policy

W hitepapers

Cyber Security Policy Starter Kit: 10 Critical Policies That Every Company Should Have in Place
cyber-security-policy-starter-kit-img

Today’s cyber security climate is more volatile than ever and the volume of potential threats your organization will be exposed to is only going to increase as time goes on. This eBook pulled directly from our toolbox here at TSI and has been modified to use as a starting point for creating the cyber security policies for your business.

  • Outlines of the 10 most relevant security policies for SMBs

  • Instructions on what to include and how to implement these in your organization

  • Sample policies for password complexity, remote access, written information security (WISP), and more

  • This field is for validation purposes and should be left unchanged.

B usiness It Blog

Welcome to The New Microsoft Teams: What This Update Means For You and Your Organization

As of Friday, March 29, all classic Microsoft Teams users have been automatically upgraded to the new Teams platform. New Teams offers a range of changes and improvements, aiming to streamline and enhance collaboration across the board. In this article, we’ll cover all the new Teams updates to help clarify how these changes will impact your organization moving forward as well as all the newly available features that will help ...
Learn More

Is Your MSP, MSSP or Cloud Service Provider Risking Your NIST 800-171 Compliance & CMMC Readiness?

Are you a Defense Industrial Base (DIB) contractor that uses an External Service Provider (ESP) like AWS, GCC or an ERP that contains Controlled Unclassified Information (CUI)? Then you should consider that as of today, ESPs will be included in scope for assessments which require them to follow specific rules outlined in NIST 800-171 and the Cybersecurity Maturity Model Certification (CMMC ). In addition to this and although not a ...
Learn More

N ew england business it podcast

Complimentary Consultation

Want to talk to an expert about your particular business? Speak with a member of our sales team to see how TSI
may be able to support and improve your business’ IT and security posture.