Entries by CTSI

Computer Transition Services, Inc. Ranked Among Top 501 Global Managed Service Providers by Channel Futures

11th Annual MSP 501 Identifies World’s Most Forward-Thinking MSPs & Leading Trends in Managed Services JULY 11TH, 2018: Computer Transition Services, Inc. ranks among the world’s 501 most strategic and innovative managed service providers (MSPs), according to Channel Futures 11th-annual MSP 501 Worldwide Company Rankings. The MSP 501 is the first, largest and most comprehensive […]

4 ways to be good to your PC

used with permission from HP Tech@Work Here’s how to keep it in top shape Let’s be real: You probably can’t swap your PC in for a new one as often as you’d like. A PC is an investment—and taking good care of it pays off in the long run. If your PC has a few […]

Build your security immunity with an IT infrastructure checkup

used with permission from Tektonika (HP) by Joe Hewitson As a species, humans have a natural tendency to overcomplicate things. Take coffee, for example: It’s gone from simple, “good ’til the last drop” black coffee to iced, half-caff, ristretto, venti, four-pump, sugar-free, cinnamon, skinny latte. You’d be hard-pressed to buy a car without a full-blown […]

Stick with Security: Secure paper, physical media, and devices

used with permission from FTC.gov by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection High-profile hackers grab the headlines. But some data thieves prefer old school methods — rifling through file cabinets, pinching paperwork, and pilfering devices like smartphones and flash drives. As your business bolsters the security of your network, don’t let […]

Revamp the way your office works with innovative technology

used with permission from Tektonika (HP) by Lydia Dishman You’ve probably heard that every business is a tech business, but have you ever thought about how the innovative technology you use on a daily basis has impacted today’s workplace culture? Consider how talking on the phone has been almost entirely replaced by text and email […]

Are passwords passé?

used with permission from HP Tech@Work Is my password still enough, or do I need more? Without question, security is critical these days. Whether it’s device, online, or mobile security, the need for protection is obvious, and the risk can’t be ignored. For years, that protection has centered on a login… and a password. But […]

Win the race against cybercrime with 3 hacking prevention tips

used with permission from Tektonika (HP) by Jasmine W. Gordon With the world’s largest global sporting event officially underway, hacking prevention is probably the furthest thing from your mind. But it’s pretty high up on the event organizers’ minds. While it may not have hit mainstream headlines, an explosive spear phishing attack and other IT […]

Computer Transition Services, Inc. Recognized for Excellence in Managed IT Services

Lubbock, TX, March 28th, 2018 – Computer Transition Services, Inc. announced today that CRN®, a brand of The Channel Company, has named Computer Transition Services, Inc. to its 2018 Managed Service Provider (MSP) 500 list in the Security 100 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services. […]

Computer Transition Services, Inc. Named to ChannelE2E Top 100 Vertical Market MSPs: 2018 Edition

Third-Annual List Reveals Accelerating Momentum for MSPs in Healthcare, Government, Financial Services, Manufacturing & More February 26th, 2018, Lubbock, TX- Computer Transition Services, Inc. has been named to After Nines Inc.’s ChannelE2E Top 100 Vertical Market MSPs list and research (https://www.channelE2E.com/top100) for 2018. The annual list and research (hashtag: #Top100MSP) identify and honor the top […]

Boost Cybersecurity with Managed Services

Did you know your organization could be subject to data breach notification laws and possible fines for data breaches and losing sensitive client data? The exact laws and regulations do vary by state and industry, among other factors. But the fact remains that poor cybersecurity can lead to grave consequences, either financial or for your reputation. […]