used with the permission of https://thenetwork.cisco.com by Jason Deign Today’s workers are more mobile, free, and flexible than ever before. That makes them harder to protect from IT threats. Ori Levi apologized as he took the stage at an October 2017 CryptoFriends Netup meeting in Barcelona. He had been up until 6 a.m. the night […]
This author has yet to write their bio.
Meanwhile lets just say that we are proud CTSI contributed a whooping 42 entries.
used with permission from FTC.gov by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection To make it harder for hackers to bluff their way onto a computer network, careful companies follow the advice of Start with Security and require strong authentication practices. We’ve considered FTC settlements, closed investigations, and the questions we get […]
When was the last time you thought about software updates and hardware upgrades? For many, updating software and hardware is not a priority because “If it ain’t broke, don’t fix it”. However, it’s clear that today’s cyber attacks prey on vulnerabilities present in old software and hardware. (This holds especially true for operating systems such […]
The big news this past week has been the Equifax breach. On September 7, Equifax — a top credit reporting firm — announced that hackers stole consumer data from mid-May through July 2017, affecting 143 million people. Hackers stole customer names, Social Security numbers, birthdates, and addresses. A smaller set of consumers also had their […]
used with permission from HP Technology at Work You’ve probably already heard that sitting at a desk all day is bad for your health. According to the World Health Organization, physical inactivity is classified as the fourth leading cause of global deaths, causing an estimated 3.2 million deaths worldwide.1 But don’t quit your desk job […]
used with permission from Microsoft US Small and Midsize Business Blog Not long ago, I blogged here about a new type of cybercrime called ransomware. But when it comes to cyber crooks, apparently they’re also using some old-fashioned methods to breach businesses’ systems. The 2017 Annual Cybersecurity Report from Cisco shows cybercrime is growing. Here’s what could be […]
used with permission from Microsoft US Small and Midsize Business Blog Does your home-based business run smoothly for most of the year but gets derailed in the summer? Maybe the longer days make you want to spend more time outside. Or maybe you can’t stand the idea of all your friends going on a great […]
used with the permission of https://thenetwork.cisco.com by Jason Deign The encryption that protects your online data can also hide malware. Detecting these harmful threats has been a problem… until now. Encryption is a valuable ally in maintaining privacy. It keeps our data safe from prying eyes. It stops people robbing our credit card details, our […]
10th Annual MSP 501 Ranking and Study Identifies World’s Most Progressive MSPs in Information Technology DATE -June 30, 2017: Computer Transition Services, Inc. ranks among the world’s most progressive 501 Managed Service Providers (MSPs), according to MSPmentor’s 10th-annual MSP 501 Worldwide Company Rankings. The top MSP 501 companies ranked this year include organizations from around […]
Computer Transition Services, Inc.