Resources

Find The Latest Security News, Trending Topics, & Success Stories

Network Security
Top 25 Most Popular Passwords of 2017

Each year, researchers from SplashData revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year.  Despite the continued warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information.

Business Operations
7 Ways to Properly Dispose or Decommission Old Technology

Whether you are moving to the cloud, refreshing equipment, moving offices and/or data centers, or simply cleaning house, properly discarding of old machines can be a tough task.  The complexity of decommissioning IT assets only becomes more of a burden when you’re working in a highly regulated industry sector.

Network Security
Unusual Ransomware Strain Encrypts Cloud Email In Real-Time

A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time.  A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure. 

2018 TSI Annual Shopping Outreach

By Nate | December 10th, 2018

The winter holidays are usually the most wonderful time of the year… unless they’re not. For many children and their parents this time of year is often depressing, stressful or simply goes by unnoticed due to more pressing problems. And this is the time of the year where we’re thankful for the opportunity help others … Continued

Microsoft April Patch Tuesday Fixes 65 Vulnerabilities, 24 Critical

By Kenneth Sprague | April 13th, 2018

With the Windows 10 1803 Spring Creators Update delayed at the eleventh hour for unknown reasons, admins and end users will still receive plenty of updates in the April 2018 Patch Tuesday.

Do I Need a Pen Test? How To Know If Pen Testing Is The Right Move

By Jeremy Louise | January 14th, 2019 | Network Security

What is Penetration Testing? Penetration testing, also commonly referred to as ethical hacking or “pen testing” for short, is a process in which a business thoroughly tests its computer system, its network or its applications in an effort to uncover any and all security vulnerabilities that could potentially be exploited by someone with malicious intentions. … Continued

10 Questions to Validate Your Backup and Disaster Recovery Strategy

By Jeremy Louise | December 19th, 2018 | Backup & Disaster Recovery

A backup and disaster recovery strategy is exactly what it sounds like: a plan for how you’re going to restore all of your critical electronic information in the event that you suffer from some type of disaster. If your office burns to the ground, this strategy will allow you to pick right up again at … Continued

How To Manage IT Infrastructure During An Office Relocation

By Roger Murray| March 8, 2018

See how TSI aided one of Massachusett's fastest growing software companies in a highly coordinated office relocation. We discuss the decision to migrate servers to the cloud in order to ensure business continuity and reduce overall operational costs, as well as the importance of a technical assessment to identify potential issues, such as Wi-Fi connectivity and signal interference that commonly occurs in office high-rise environments. Continued

DFARS NIST 800-171: Compliance Checklist

By Roger Murray| October 20, 2017

The need for strong security measures to protect sensitive government data from hackers has never been more pertinent. To address this problem, the Department of Commerce National Institute of Standards & Technology has released NIST Special Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Infromation Systems & Organizations. If you are a contractor to governmental agencies, SP800-171 impacts your ability to continue doing business with the Government unless you are compliant. Continued

201 CMR 17.00: Massachusetts Compliance Guidelines

By Roger Murray| December 5, 2017

Massachusetts has a high standard for consumer protection that most states look to as a source to frame their own laws. 201 CMR 17.00 requires any business that stores or licenses personal infromation of residents in the state to notify the Office Of Consumer Affairs & Business Regulation, as well as the Office of Attorney General and those affected, within a reasonable amount of time of suspecting a breach of security. The notifications must include... Continued

Guide: How To Guard Against HIPAA Privacy Breach Fines & Violations

By Roger Murray| October 4, 2017

In 2016, the Health Insurance Portability & Accountability Act (HIPAA) collected over 23 Million in Civil Money Penalties (CMPs) related to businesses violating patient data privacy provisions. Over half of the cases involved organizations who failed to even have a proper risk assessment conducted. The cost for violating HIPAA privacy protections continue to grow, which is why we decided to provide a list of the most common violations, as well as how to avoid them. Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979