{"id":8197,"date":"2015-06-09T16:05:19","date_gmt":"2015-06-09T16:05:19","guid":{"rendered":"https:\/\/tsisupport.com\/?p=330"},"modified":"2015-06-09T16:05:19","modified_gmt":"2015-06-09T16:05:19","slug":"the-cloud-social-media-and-security","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=8197","title":{"rendered":"The Cloud, Social Media, and Security"},"content":{"rendered":"<p>The struggle between the needs of employees and the responsibility of the IT department has always been a tough one. Each and every employee \u2013 including the IT staff \u2013 go into work intent on doing their job in the most efficient way possible. For many employees, that means finding tools that will allow them to collaborate and share work seamlessly and quickly, whether or not it\u2019s approved by their IT department.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/Cloud-Security.png\" alt=\"Cloud Security\" width=\"410\" height=\"412\" \/><\/p>\n<p>Cloud services, such as Google Drive, or Social Media services, such as Facebook and Google Hangouts, have made it easier for employees to share work, interact with co-workers without pausing to pick up the phone or walk down the hall, and even work remotely when necessary.<\/p>\n<p>But they\u2019ve also become a nightmare for IT departments.<\/p>\n<p>Unfortunately \u2013 as <a href=\"mailto:http:\/\/www.forbes.com\/sites\/netapp\/2015\/03\/09\/fight-shadow-it\/\"><em>Forbes<\/em><\/a> points out \u2013 this increased productivity and efficiency (and sure, probably some social updating as well), means that employees are using technology and apps that are \u201cwithin the organization, but out of your control.\u201d This means that if something goes wrong \u2013 if there\u2019s a security breach or data loss \u2013 it\u2019s still something that the IT department will need to handle, even though the services weren\u2019t necessarily something the IT department dealt with.<\/p>\n<p>The \u201ceasy\u201d approach would probably be to lock down your company\u2019s external Internet access and tell employees that they\u2019ve got to make do with the resources that the IT department provides, but unfortunately that isn\u2019t very realistic. In today\u2019s workplace \u2013 one that seems to stress \u201cwork-life integration\u201d \u2013\u00a0 employees expect that they\u2019ll be able to access files quickly and easily or that they\u2019ll be able to pop onto Facebook for a few minutes every once in a while. For some employees, having access to various Cloud sharing portals and Social Media platforms may even be part of their job depending on the industry you\u2019re in.<\/p>\n<p>Additionally, the emergence of <a href=\"https:\/\/tsisupport.com\/tsistaging\/does-your-company-have-a-bring-your-own-device-byod-policy\/\">Bring Your Own Device<\/a> policies has had an impact as well. While your employees may not be able to access certain websites while connected to the company\u2019s network, if they do work from home on their personal computer or are using their personal phone for business as well, all bets are off. If they accidentally download a virus on their personal computer and it somehow gets embedded in a work document that then gets shared with even one person in your company, the entire company is now at risk!<\/p>\n<p><em><strong>\u00a0At Technical Support International (TSI), we\u2019re well-versed in keeping your company safe. For over 25 years we\u2019ve worked with IT managers and companies to ensure the security of their technology environments. From deploying anti-virus software to firewalls, vulnerability scanning, and VPNs, we\u2019ve done it all.<\/strong><\/em><\/p>\n<p><em><strong>\u00a0For more information on how we can keep your company safe, call us at (508) 543-6979.<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The struggle between the needs of employees and the responsibility of the IT department has always been a tough one. Each and every employee \u2013 including the IT staff \u2013 go into work intent on doing their job in the most efficient way possible. For many employees, that means finding tools that will allow them&hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[40],"tags":[79,80,81,70,82,19,22,83],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Cloud Social Media and Security - TSI Support<\/title>\n<meta name=\"description\" content=\"Running a business in the world of cloud computing, social media, and cybersecurity is a challenge. Read on to learn about technologies that can help.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Cloud Social Media and Security - TSI Support\" \/>\n<meta property=\"og:description\" content=\"Running a business in the world of cloud computing, social media, and cybersecurity is a challenge. Read on to learn about technologies that can help.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=8197\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-09T16:05:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/Cloud-Security.png\" \/>\n<meta name=\"author\" content=\"Brian Downey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Downey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8197\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8197\",\"name\":\"The Cloud Social Media and Security - TSI Support\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8197#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8197#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/Cloud-Security.png\",\"datePublished\":\"2015-06-09T16:05:19+00:00\",\"dateModified\":\"2015-06-09T16:05:19+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\"},\"description\":\"Running a business in the world of cloud computing, social media, and cybersecurity is a challenge. Read on to learn about technologies that can help.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8197#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=8197\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8197#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/Cloud-Security.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/Cloud-Security.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8197#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Cloud, Social Media, and Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\",\"name\":\"Brian Downey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"caption\":\"Brian Downey\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=8\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Cloud Social Media and Security - TSI Support","description":"Running a business in the world of cloud computing, social media, and cybersecurity is a challenge. Read on to learn about technologies that can help.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Cloud Social Media and Security - TSI Support","og_description":"Running a business in the world of cloud computing, social media, and cybersecurity is a challenge. Read on to learn about technologies that can help.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=8197","og_site_name":"TSI Support","article_published_time":"2015-06-09T16:05:19+00:00","og_image":[{"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/Cloud-Security.png"}],"author":"Brian Downey","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brian Downey","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8197","url":"https:\/\/tsisupport.com\/tsistaging\/?p=8197","name":"The Cloud Social Media and Security - TSI Support","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8197#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8197#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/Cloud-Security.png","datePublished":"2015-06-09T16:05:19+00:00","dateModified":"2015-06-09T16:05:19+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c"},"description":"Running a business in the world of cloud computing, social media, and cybersecurity is a challenge. Read on to learn about technologies that can help.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8197#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=8197"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8197#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/Cloud-Security.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/Cloud-Security.png"},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8197#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"The Cloud, Social Media, and Security"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c","name":"Brian Downey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","caption":"Brian Downey"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=8"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/8197"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8197"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/8197\/revisions"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}