TSI's Information Technology Blog
Employee Spotlight – Derek Choun
We are thrilled to introduce our newest addition to the TSI team, Derek Choun, who has joined our managed services department as an IT Engineer. Derek has quickly emerged as a standout in the field of IT, driven by his insatiable thirst for knowledge and unwavering curiosity. TSI considers itself incredibly fortunate to have Derek onboard, and we eagerly anticipate the valuable contributions he will make to our company’s growth.…
ContinuedHAVE ITAR DATA AND CMMC REQUIREMENTS? READ THIS TODAY: MEASURE TWICE, CUT ONCE!
In the world of defense industry regulations, ITAR and CMMC are two important sets of regulatory requirements that many within the defense industrial base need to adhere to. Although both regulations are distinct and tailored to their respective purposes, many companies dealing with ITAR-controlled items or information will need to comply with CMMC requirements to do business with the DoD, which adds an additional layer of complexity- and potential costs-…
ContinuedCybersecurity Insurance is a Waste of Money… If You’re Not Doing These 5 Things Today!
Cybersecurity insurance has become an increasingly popular solution for businesses to protect themselves against today’s increasingly volatile cybersecurity threats. While cybersecurity insurance can provide some degree of a safety net for businesses, there are a number of considerable considerations to keep in mind in order for your cybersecurity policy to work and pay out a claim in the unfortunate case of a breach. In this article, we’ll clarify the required-…
ContinuedThe 5 Most Important Questions to Ask your SIEM Provider & When You Should Probably Re-Evaluate Your Current Solution
First Things First: What is a SIEM? A SIEM (Security Information and Event Management) is a software solution that collects and analyzes security data from multiple sources in real-time to detect and respond to security threats. It aggregates and correlates logs and alerts generated from different sources, such as network devices, servers, and applications, and uses machine learning algorithms to identify patterns of suspicious behavior or anomalies. SIEMs also provide…
ContinuedTime-Sensitive Approval Required for Security Vulnerability Fix
We want to bring to your attention that threat actors are targeting organizations using top level domains (particularly .mov and .zip domains) that were recently introduced by Google, which potentially pose a significant security risk to your organization. The primary concern arises from the fact that .mov and.zip are commonly used file extensions for internet-shared files and by utilizing .mov or .zip as a domain, threat actors can deceive victims…
ContinuedTime-Sensitive Approval Required for Security Vulnerability Fix
We want to bring to your attention that threat actors are targeting organizations using top level domains (particularly .mov and .zip domains) that were recently introduced by Google, which potentially pose a significant security risk to your organization. The primary concern arises from the fact that .mov and.zip are commonly used file extensions for internet-shared files and by utilizing .mov or .zip as a domain, threat actors can deceive victims…
ContinuedTraveling for Memorial Day? 5 Cybersecurity Tips to Keep You & Your Family Safe this Summer!
Traveling for Memorial Day? 5 Cybersecurity Tips to Keep You & Your Family Safe this Summer! Cybersecurity is a crucial aspect of our lives that we cannot afford to neglect especially when our guard is down on vacation! While vacations are meant to be a time to relax and unwind, they can also present opportunities for cyber criminals to exploit our vulnerabilities. In this article, we will provide you with…
Continued5 Most Important Questions to Ask your SIEM Provider & When You Should Probably Re-Evaluate Your Current Solution
First Things First: What is a SIEM? A SIEM (Security Information and Event Management) is a software solution that collects and analyzes security data from multiple sources in real-time to detect and respond to security threats. It aggregates and correlates logs and alerts generated from different sources, such as network devices, servers, and applications, and uses machine learning algorithms to identify patterns of suspicious behavior or anomalies. SIEMs also provide…
ContinuedCybersecurity Insurance is a Waste of Money… If You’re Not Doing These 5 Things Today!
Cybersecurity insurance has become an increasingly popular solution for businesses to protect themselves against today’s increasingly volatile cybersecurity threats. While cybersecurity insurance can provide some degree of a safety net for businesses, there are a number of considerable considerations to keep in mind in order for your cybersecurity policy to work and pay out a claim in the unfortunate case of a breach. In this article, we’ll clarify the required-…
ContinuedTSI Employee Spotlight: Mike Sutcliffe
We are extremely pleased to introduce our latest team member, Mike Sutcliffe as an IT Security Specialist . Mike brings many years of hands-on IT experience with deep knowledge in systems administration, networking, and security. Most recently and since 2012, Mike held a Lead IT role where his daily responsibilities involved end-to-end IT including installations, problem resolution, and administration. In addition to Mike’s IT acumen, he has worked within fast-paced managed…
ContinuedCategories
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
