Resources

Find The Latest Security News, Trending Topics, & Success Stories

Cloud Services
Dive Into Cloud Computing

Cloud computing –  simply put – is internet based computing in lieu of building or maintaining large in-house technology infrastructure. In the past, users would download software onto a physical computer or server in the office.  Now with the prevalence of faster connectivity speeds and the remote nature of today’s workplace, SAAS models (software as … Continued

Project & Contracted Services
An Inside Job: The Real Threat to Your Business Network’s Security

Today, the number of types of cyber-attacks which threaten the security of your businesses are endless.  We’ve discussed the greatest weakness in network security being users before, but the focus was in a non-acting participant being coerced into clicking on a malicious link or opening a dangerous attachment. We often focus so much attention to … Continued

Network Security
An IT Director’s Best Practices for E-Mail Security

E-Mail is one of the most commonly used applications in the world.  It provides organizations with a quick and cost effective means to communicate and, from inception, it quickly became a necessity most businesses could not live without.  However, hackers are keenly aware of this fact as well and continuously devise new creative ways to … Continued

TSI Annual Holiday Shopping Outreach 2017

By Roger Murray | December 6th, 2017

For over 17 years TSI has partnered with the Foxboro Discretionary Fund to support our local community of families throughout the Foxboro area.

Bad Rabbit Targeted Ransomware Attack Is Bad News

By Roger Murray | October 25th, 2017

It was reported yesterday that this year’s third major Ransomware incident – dubbed Bad Rabbit – began infecting a number of ‘high profile’ targets throughout Russia and greater Eastern Europe; specifically, Poland, Germany, the Ukraine, and South Korea. Based on the nature and characteristics of the attack, security experts are comparing it to the WannaCry and Petya ransomwares earlier this year.

Hilton Data Breach Results in $700,000 Penalty

By Roger Murray | November 13th, 2017 | Governance & IT Compliance

Hilton Hotels reached a settlement this month with New York Attorney General Eric T. Schneiderman and Vermont Attorney General TJ Donovan following two breaches in 2015. The settlement totaled $700,000

7 Ways to Properly Dispose or Decommission Old Technology

By Roger Murray | November 8th, 2017 | Business Operations

Whether you are moving to the cloud, refreshing equipment, moving offices and/or data centers, or simply cleaning house, properly discarding of old machines can be a tough task.  The complexity of decommissioning IT assets only becomes more of a burden when you’re working in a highly regulated industry sector.

DFARS NIST 800-171: Compliance Checklist

By Roger Murray| October 20, 2017

The need for strong security measures to protect sensitive government data from hackers has never been more pertinent. To address this problem, the Department of Commerce National Institute of Standards & Technology has released NIST Special Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Infromation Systems & Organizations. If you are a contractor to governmental agencies, SP800-171 impacts your ability to continue doing business with the Government unless you are compliant. Continued

201 CMR 17.00: Massachusetts Compliance Guidelines

By Roger Murray| December 5, 2017

Massachusetts has a high standard for consumer protection that most states look to as a source to frame their own laws. 201 CMR 17.00 requires any business that stores or licenses personal infromation of residents in the state to notify the Office Of Consumer Affairs & Business Regulation, as well as the Office of Attorney General and those affected, within a reasonable amount of time of suspecting a breach of security. The notifications must include... Continued

Guide: How To Guard Against HIPAA Privacy Breach Fines & Violations

By Roger Murray| October 4, 2017

In 2016, the Health Insurance Portability & Accountability Act (HIPAA) collected over 23 Million in Civil Money Penalties (CMPs) related to businesses violating patient data privacy provisions. Over half of the cases involved organizations who failed to even have a proper risk assessment conducted. The cost for violating HIPAA privacy protections continue to grow, which is why we decided to provide a list of the most common violations, as well as how to avoid them. Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979