Find The Latest Security News, Trending Topics, & Success Stories

Network Security
Top 25 Most Popular Passwords of 2017

Each year, researchers from SplashData revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year.  Despite the continued warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information.

Business Operations
7 Ways to Properly Dispose or Decommission Old Technology

Whether you are moving to the cloud, refreshing equipment, moving offices and/or data centers, or simply cleaning house, properly discarding of old machines can be a tough task.  The complexity of decommissioning IT assets only becomes more of a burden when you’re working in a highly regulated industry sector.

Network Security
Unusual Ransomware Strain Encrypts Cloud Email In Real-Time

A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time.  A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure. 

Microsoft March Patch Tuesday Fixes 74 Security Issues

By Kenneth Sprague | March 19th, 2018

Microsoft has released its monthly security updates, and this month the company patched 74 vulnerabilities affecting products such as Internet Explorer, Microsoft Edge, Microsoft Windows, Microsoft Exchange Server, ASP.NET Core, .NET Core, PowerShell Core, ChakraCore, Microsoft Office, and Microsoft Office Services and Web Apps.

Trustico CEO Compromises 23,000 HTTPS Private Keys

By Kenneth Sprague | March 2nd, 2018

March didn’t get off to a great start following the recent revelation that the CEO of a certificate reseller emailed a partner the sensitive private keys for 23,000 TLS certificates. The email was sent on Tuesday by the CEO of Trustico…

New PCI Compliance Standards Deadline Approaching

By Roger Murray | January 30th, 2018 | Project & Contracted Services

The Payment Card Industry Security Standards Council (PCI SSC) has published a new version of the industry standard that businesses use to safeguard payment data before, during, and after purchase.  PCI Data Security Standard (PCI DSS) version 3.2 replaces previous versions in addressing the growing threats to customer payment information.

Infected USB Drives Handed Out at Data Security Event

By Roger Murray | January 19th, 2018 | Network Security

During a recent data security expo hosted by Taiwan’s Presidential Office, 54 malware-infested thumb drives were handed out to the public by the Criminal Investigation Bureau. These infected USB sticks were among the 250 drives the bureau gave to winners of a game about cybersecurity knowledge at their exhibit.

How To Manage IT Infrastructure During An Office Relocation

By Roger Murray| March 8, 2018

See how TSI aided one of Massachusett's fastest growing software companies in a highly coordinated office relocation. We discuss the decision to migrate servers to the cloud in order to ensure business continuity and reduce overall operational costs, as well as the importance of a technical assessment to identify potential issues, such as Wi-Fi connectivity and signal interference that commonly occurs in office high-rise environments. Continued

DFARS NIST 800-171: Compliance Checklist

By Roger Murray| October 20, 2017

The need for strong security measures to protect sensitive government data from hackers has never been more pertinent. To address this problem, the Department of Commerce National Institute of Standards & Technology has released NIST Special Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Infromation Systems & Organizations. If you are a contractor to governmental agencies, SP800-171 impacts your ability to continue doing business with the Government unless you are compliant. Continued

201 CMR 17.00: Massachusetts Compliance Guidelines

By Roger Murray| December 5, 2017

Massachusetts has a high standard for consumer protection that most states look to as a source to frame their own laws. 201 CMR 17.00 requires any business that stores or licenses personal infromation of residents in the state to notify the Office Of Consumer Affairs & Business Regulation, as well as the Office of Attorney General and those affected, within a reasonable amount of time of suspecting a breach of security. The notifications must include... Continued

Guide: How To Guard Against HIPAA Privacy Breach Fines & Violations

By Roger Murray| October 4, 2017

In 2016, the Health Insurance Portability & Accountability Act (HIPAA) collected over 23 Million in Civil Money Penalties (CMPs) related to businesses violating patient data privacy provisions. Over half of the cases involved organizations who failed to even have a proper risk assessment conducted. The cost for violating HIPAA privacy protections continue to grow, which is why we decided to provide a list of the most common violations, as well as how to avoid them. Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week