Resources

Find The Latest Security News, Trending Topics, & Success Stories

Network Security
Top 25 Most Popular Passwords of 2017

Each year, researchers from SplashData revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year.  Despite the continued warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information.

Business Operations
7 Ways to Properly Dispose or Decommission Old Technology

Whether you are moving to the cloud, refreshing equipment, moving offices and/or data centers, or simply cleaning house, properly discarding of old machines can be a tough task.  The complexity of decommissioning IT assets only becomes more of a burden when you’re working in a highly regulated industry sector.

Network Security
Unusual Ransomware Strain Encrypts Cloud Email In Real-Time

A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time.  A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure. 

2018 TSI Annual Shopping Outreach

By Nate | December 10th, 2018

The winter holidays are usually the most wonderful time of the year… unless they’re not. For many children and their parents this time of year is often depressing, stressful or simply goes by unnoticed due to more pressing problems. And this is the time of the year where we’re thankful for the opportunity help others … Continued

Microsoft April Patch Tuesday Fixes 65 Vulnerabilities, 24 Critical

By Kenneth Sprague | April 13th, 2018

With the Windows 10 1803 Spring Creators Update delayed at the eleventh hour for unknown reasons, admins and end users will still receive plenty of updates in the April 2018 Patch Tuesday.

Why You Don’t Really Need Penetration Testing… at Least, Not YET

By Jeremy Louise | October 23rd, 2019 | Network Security

Coming from a family that has been proudly serving the greater Boston area with innovative, technology-based solutions since 1989, a big part of my life involves staying up-to-date on everything going on in the IT space. When I’m not fielding calls with potential clients or helping existing ones better accomplish their long-term goals, I’m pouring … Continued

How The Shifting IT Landscape Gave Rise to the Era of Co-Managed IT

By Jeremy Louise | September 23rd, 2019 | Managed Services

It’s no secret that technology moves fast. But what a lot of people don’t realize is that the very idea of what it means to be an IT professional often changes just as quickly. When my father started TSI Support in 1989 and before the advent of managed services, all MSPs were essentially the exact … Continued

How To Manage IT Infrastructure During An Office Relocation

By Roger Murray| March 8, 2018

See how TSI aided one of Massachusett's fastest growing software companies in a highly coordinated office relocation. We discuss the decision to migrate servers to the cloud in order to ensure business continuity and reduce overall operational costs, as well as the importance of a technical assessment to identify potential issues, such as Wi-Fi connectivity and signal interference that commonly occurs in office high-rise environments. Continued

DFARS NIST 800-171: Compliance Checklist

By Roger Murray| October 20, 2017

The need for strong security measures to protect sensitive government data from hackers has never been more pertinent. To address this problem, the Department of Commerce National Institute of Standards & Technology has released NIST Special Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Infromation Systems & Organizations. If you are a contractor to governmental agencies, SP800-171 impacts your ability to continue doing business with the Government unless you are compliant. Continued

201 CMR 17.00: Massachusetts Compliance Guidelines

By Roger Murray| December 5, 2017

Massachusetts has a high standard for consumer protection that most states look to as a source to frame their own laws. 201 CMR 17.00 requires any business that stores or licenses personal infromation of residents in the state to notify the Office Of Consumer Affairs & Business Regulation, as well as the Office of Attorney General and those affected, within a reasonable amount of time of suspecting a breach of security. The notifications must include... Continued

Guide: How To Guard Against HIPAA Privacy Breach Fines & Violations

By Roger Murray| October 4, 2017

In 2016, the Health Insurance Portability & Accountability Act (HIPAA) collected over 23 Million in Civil Money Penalties (CMPs) related to businesses violating patient data privacy provisions. Over half of the cases involved organizations who failed to even have a proper risk assessment conducted. The cost for violating HIPAA privacy protections continue to grow, which is why we decided to provide a list of the most common violations, as well as how to avoid them. Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979