Computer Transition Services, Inc.
  • About Us
  • What We Do
  • The CTSI Experience
  • Resources
  • Locations
    • Lubbock, TX
    • Amarillo, TX
    • Abilene, TX
    • Midland, TX
    • Plano, TX
  • Careers
  • Contact Us
  • CTSI Referral Program
  • Support
  • Pay My Bill
  • 1.800.OUR.CTSI
  • Search
  • Menu Menu
CTSI

About CTSI

This author has yet to write their bio.
Meanwhile lets just say that we are proud CTSI contributed a whooping 118 entries.

Entries by

Stick with Security: Segment your network and monitor who’s trying to get in and out

December 20, 2017 in Blog, Cybersecurity /by CTSI

used with permission from FTC.gov by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection Who’s coming in and what’s going out? Businesses that want to stick with security build commonsense monitoring into their brick-and-mortar operations. Whether it’s a key card reader at the door or a burglar alarm activated at night, careful companies […]

3 Security Advantages of Managed IT Services

December 20, 2017 in Blog, Cybersecurity, Managed IT Services /by CTSI

Managed IT services, or outsourced remote network management, can help your business in many ways. It’s a cost effective way of having your IT infrastructure monitored and maintained by experts instead of hiring an IT director. Or, it can free up your IT director and IT staff to work on more important projects than daily […]

When is a Simple Data Backup Not Enough?

November 21, 2017 in Blog, Business Tips /by CTSI

You know you need data backup, but when do you need a business continuity solution? If you’ve been paying attention to the news, you’ll know that massive global ransomware attacks are only growing in scale and frequency. These attacks and other threats and accidents that cripple, ransom, or destroy organizations’ data are a convincing argument […]

Cyber-Protecting the 21st Century Workforce

November 21, 2017 in Blog, Cybersecurity /by CTSI

used with the permission of https://thenetwork.cisco.com by Jason Deign Today’s workers are more mobile, free, and flexible than ever before. That makes them harder to protect from IT threats. Ori Levi apologized as he took the stage at an October 2017 CryptoFriends Netup meeting in Barcelona. He had been up until 6 a.m. the night […]

Stick With Security: Require Secure Passwords and Authentication

October 29, 2017 in Blog, Cybersecurity /by CTSI

used with permission from FTC.gov by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection To make it harder for hackers to bluff their way onto a computer network, careful companies follow the advice of Start with Security and require strong authentication practices. We’ve considered FTC settlements, closed investigations, and the questions we get […]

Why Bother With Software Updates and Hardware Upgrades?

September 29, 2017 in Blog, Business Tips /by CTSI

When was the last time you thought about software updates and hardware upgrades? For many, updating software and hardware is not a priority because “If it ain’t broke, don’t fix it”. However, it’s clear that today’s cyber attacks prey on vulnerabilities present in old software and hardware. (This holds especially true for operating systems such […]

Equifax Breach: What Should You Do to Protect Yourself?

September 29, 2017 in Blog, News /by CTSI

The big news this past week has been the Equifax breach. On September 7, Equifax — a top credit reporting firm — announced that hackers stole consumer data from mid-May through July 2017, affecting 143 million people. Hackers stole customer names, Social Security numbers, birthdates, and addresses. A smaller set of consumers also had their […]

6 Ways to Exercise in the Office

August 28, 2017 in Blog, Business Tips /by CTSI

used with permission from HP Technology at Work You’ve probably already heard that sitting at a desk all day is bad for your health. According to the World Health Organization, physical inactivity is classified as the fourth leading cause of global deaths, causing an estimated 3.2 million deaths worldwide.1 But don’t quit your desk job […]

What Does Your Business Stand to Lose in a Cyber Attack?

August 28, 2017 in Blog, Cybersecurity /by CTSI

used with permission from Microsoft US Small and Midsize Business Blog Not long ago, I blogged here about a new type of cybercrime called ransomware. But when it comes to cyber crooks, apparently they’re also using some old-fashioned methods to breach businesses’ systems. The 2017 Annual Cybersecurity Report from Cisco shows cybercrime is growing. Here’s what could be […]

Page 11 of 14«‹910111213›»

Categories

  • Blog
  • Business Communication
  • Business Tips
  • Cybersecurity
  • Education
  • Government
  • Healthcare
  • Managed IT Services
  • Networking
  • News
  • Press Release

Subscribe to Our Newsletter

Computer Transition Services, Inc.

Lubbock
3223 S Loop 289
Suite 556
Lubbock, TX 79423

806-793-8961

Amarillo
817 S Polk St
Suite 101
Amarillo, TX 79101

806-318-7650

Midland
3300 N A St
Building 6, Suite 130
Midland, TX 79705

432-253-5210

Plano
7250 Dallas Pkwy
Plano, TX 75024

806.793.8961
1.800.OUR.CTSI

 

 

 

Sitemap
About Process Services Testimonials Contact Us Resources Support Careers Transparency in Coverage
this business is lubbock safe logo
Social Media
facebook logo twitter logo linkedin logo
Comp TIA Security TRUSTMARK log
© Copyright - Computer Transition Services, Inc. All rights reserved 2021 | Sitemap | Privacy Policy
Scroll to top