How to Counteract VoIP Vulnerabilities: VoIP Security Risks

In today’s day and age we have become familiar and hopefully cautious when receiving strange emails with a random file attached. It’s unlikely that we would give it a second thought before deleting. This is because we recognize the need for cyber security to limit the onslaught of digital threats we receive on a seemingly…

Read More

How to Become PCI Compliant: An Informal PCI Compliance Checklist

If your business processes credit cards or other forms of electronic payment, it is required to meet the standards established by the Payment Card Industry (PCI).  That means not only retailers, but any establishment that accepts card payments in their place of business.  If you don’t maintain PCI standards for compliance and suffer a data…

Read More

TSI Business Success Stories: Rebecca’s Cafe

TSI recently completed a server replacement and backup solution for a bustling client, Rebecca’s Café. Arthur Lemieux, one of our project managers, along with a team of highly skilled engineers, managed the initiative while ensuring an extremely busy client experienced not only a seamless transition, but minimal downtime. Challenge: Rebecca’s Café has had tremendous growth, particularly within…

Read More

Monitoring Internet Traffic at work

If you are small or mid-sized business owner, you need to read this: At TSI, 100% of all our clients have some type of full-time Internet connection, 99% use a hardware firewall and 8 % monitor Internet usage  within their own organizations (which means 92% don’t!)  It always amazes me that when I ask a business owner about…

Read More