Cyber Security
GSA Stars III Contractors Face New Rules: CMMC DoD
Critical Update for GSA Stars III Contractors; New IT Compliance Requirement Mandates Organizations that are listed under the GSA are companies that work with the government, outside of the DoD. It was recently announced (GSA STARS III CMMC Release) that- effectively immediately- GSA companies may have to begin adhering to the CMMC if required within their contracts. Although the majority of them falling under the CMMC 1 requirements, the CMMC…
Continued about GSA Stars III Contractors Face New Rules: CMMC DoDWe’re Updating TSI’s Managed IT Support Services: Security and Compliance Notification
As today’s cybersecurity threats increase in frequency, complexity, and impact, we’ve had to adapt our IT services model to address these very areas of focus. Over the last few years, this evolution has led TSI toward becoming a full-fledged Managed Security Services Provider (MSSP) that can not only help address your cybersecurity gaps but also help achieve our clients’ compliance requirements. As your trusted IT partner, it’s of the utmost…
Continued about We’re Updating TSI’s Managed IT Support Services: Security and Compliance NotificationTSI Employee Spotlight: John Bermingham
John Bermingham joined the team in 2020 as TSI’s resident cybersecurity and compliance expert. Throughout his twenty-five years in the IT and cybersecurity industry as a US Airman and later on as a contractor, John has worked with a wide variety of government agencies and companies to include ACS Defense Inc., Lockheed Martin Corp., Northrop Grumman Corp., and several Federally Funded Research and Development Centers (FFRDCs). We connected with John…
Continued about TSI Employee Spotlight: John BerminghamVulnerable Software: A 17-Year-Old Vulnerability Was Just Discovered in Windows Server
Meet SIGRed First “discovered” in July of 2020, SIGRed is a very particular type of vulnerability in the Windows DNS Server environment called an RCE, or remote code execution. This means that it can be triggered by an attacker with little more than a malicious DNS response. Believe it or not, it’s actually been around for 17 years and impacts all Microsoft O/S from Server 2003 all the way up…
Continued about Vulnerable Software: A 17-Year-Old Vulnerability Was Just Discovered in Windows ServerHow to Web Conference Safely: Cybersecurity Risk Management
Over the last few weeks, more and more of our clients at TSI have quickly become comfortable with video and web conferencing solutions like Zoom – which is terrific. Still, we wanted to take this opportunity to remind you to stay up-to-date on all of the scams and vulnerabilities that are associated with these platforms, many of which are growing more common by the day. So many of these communications…
Continued about How to Web Conference Safely: Cybersecurity Risk ManagementProtecting Yourself Online: How to Beat Covid-19 Scammers
According to data recently released by the Federal Trade Commission, consumers have already lost about $5.85 million to various Coronavirus related schemes ALONE and likely don’t include those that haven’t been reported to the agency. With a costly $600 average loss per instance, it’s a seemingly lucrative tactic that does not appear to be going away. Unfortunately, it should come as no surprise that there is no shortage of malicious actors…
Continued about Protecting Yourself Online: How to Beat Covid-19 ScammersCategories
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place