Resources

Find The Latest Security News, Trending Topics, & Success Stories

Network Security
Top 25 Most Popular Passwords of 2017

Each year, researchers from SplashData revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year.  Despite the continued warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information.

Business Operations
7 Ways to Properly Dispose or Decommission Old Technology

Whether you are moving to the cloud, refreshing equipment, moving offices and/or data centers, or simply cleaning house, properly discarding of old machines can be a tough task.  The complexity of decommissioning IT assets only becomes more of a burden when you’re working in a highly regulated industry sector.

Network Security
Unusual Ransomware Strain Encrypts Cloud Email In Real-Time

A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time.  A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure. 

2018 TSI Annual Shopping Outreach

By Nate | December 10th, 2018

The winter holidays are usually the most wonderful time of the year… unless they’re not. For many children and their parents this time of year is often depressing, stressful or simply goes by unnoticed due to more pressing problems. And this is the time of the year where we’re thankful for the opportunity help others … Continued

Microsoft April Patch Tuesday Fixes 65 Vulnerabilities, 24 Critical

By Kenneth Sprague | April 13th, 2018

With the Windows 10 1803 Spring Creators Update delayed at the eleventh hour for unknown reasons, admins and end users will still receive plenty of updates in the April 2018 Patch Tuesday.

Two Birds, One Stone: Here’s How to Address ISO 27001 and 13845 at the Same Time

By Chris Souza | September 19th, 2019 | Governance & IT Compliance

As someone who has been providing IT support to SMBs for nearly 30 years, there’s one topic that seems to come up with my clients over and over (and over) again: Compliance. We all understand that compliance is important – there’s really nobody on the other side of that issue. But where people start to … Continued

MSPs vs. MSSPs: What are the Differences, and Which One is Right For YOUR Business

By Jeremy Louise | August 23rd, 2019 | Managed Services Network Security

While TSI has been working with local area businesses, with all of their technology support needs, for nearly three decades, I’ve always seen my primary job as an educator first and foremost. I don’t just want to help you get the most out of your technology – I want to help you understand why that … Continued

How To Manage IT Infrastructure During An Office Relocation

By Roger Murray| March 8, 2018

See how TSI aided one of Massachusett's fastest growing software companies in a highly coordinated office relocation. We discuss the decision to migrate servers to the cloud in order to ensure business continuity and reduce overall operational costs, as well as the importance of a technical assessment to identify potential issues, such as Wi-Fi connectivity and signal interference that commonly occurs in office high-rise environments. Continued

DFARS NIST 800-171: Compliance Checklist

By Roger Murray| October 20, 2017

The need for strong security measures to protect sensitive government data from hackers has never been more pertinent. To address this problem, the Department of Commerce National Institute of Standards & Technology has released NIST Special Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Infromation Systems & Organizations. If you are a contractor to governmental agencies, SP800-171 impacts your ability to continue doing business with the Government unless you are compliant. Continued

201 CMR 17.00: Massachusetts Compliance Guidelines

By Roger Murray| December 5, 2017

Massachusetts has a high standard for consumer protection that most states look to as a source to frame their own laws. 201 CMR 17.00 requires any business that stores or licenses personal infromation of residents in the state to notify the Office Of Consumer Affairs & Business Regulation, as well as the Office of Attorney General and those affected, within a reasonable amount of time of suspecting a breach of security. The notifications must include... Continued

Guide: How To Guard Against HIPAA Privacy Breach Fines & Violations

By Roger Murray| October 4, 2017

In 2016, the Health Insurance Portability & Accountability Act (HIPAA) collected over 23 Million in Civil Money Penalties (CMPs) related to businesses violating patient data privacy provisions. Over half of the cases involved organizations who failed to even have a proper risk assessment conducted. The cost for violating HIPAA privacy protections continue to grow, which is why we decided to provide a list of the most common violations, as well as how to avoid them. Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979