Phishing Emails – What to Look For

As with every organization, job functions vary by department, but we all share one common responsibility: protecting the private data of our clients, customers, partners, and co-workers.

Employee Security Training

Employee Security Training Human-error; we talk about it all the time, but what exactly do we mean?  Human-error occurs when an individual performs a task or does something with an unintended outcome.  It’s easy to point the finger at employee’s as being an organization’s weakest link, but without appropriate security awareness training provided by the […]

How Does the Dark Web Impact Small to Medium Size Businesses

  How Does the Dark Web Impact Small to Medium Size Businesses Identity theft is an unfortunate occurrence that is all too familiar with most business owners, but do those individuals know where the compromised data will end up?  Often, these business owners are unaware of the virtual marketplace where stolen data is purchased and […]

Critical PC Chip Security Vulnerability Found

ISSUE Computer researchers have recently found out that the main chip in most modern computers—the CPU—has a hardware bug. It’s really a design flaw in the hardware that has been there for years. This is a big deal because it affects almost every computer, including workstations and servers (and yes, even Apple iOS and MACs!) […]

IT Managed Services – Is it right for you?

What are Managed Services? Managed services is defined as the practice of outsourcing day-to-day management responsibilities and functions as a strategic method for improving operations and cutting expenses. Working with a managed services provider gives clients peace of mind and frees up valuable resources to focus on business productivity and profitability. What gets accomplished? Computer […]

Data Breach!

Data breach. If you click on the term data breach hyperlink will take you to have music to the company the term data breach because the consequences can truly be quite serious and destructive. Did you know that in the first four months of 2014 there were more than 300 publicly disclosed data breaches in […]

VDI – Virtual Desktop Infrastructure

My wife informed me that my original title for this post “VDI and other productivity enhancing TLAs” was confusing, she also told in my hair looked ridiculous…She was right about the hair so I quick changed the title to the current iteration. Virtual Desktop Infrastructure or VDI, is not new to the IT computing world. […]

Critical Data Storage and Recovery…What’s Your Plan?

Summer has officially kicked off in the state of Minnesota, the part of the world where CSI Onsite resides. For those of us who reside in Minnesota Since the readership for this blog is located across the globe allow me to briefly describe what Minnesota summer weather can be like. Minnesota is a state where […]

The Mighty, Mini Raspberry Pi -Part Two

If you consider yourself a techno-stein, hacker, or a dedicated IT enthusiast, and you’ve never heard about the Raspberry Pi, you’re in for a treat. In our last blog simply titled Raspberry Pi we briefly explored the credit card sized computer called Raspberry Pi and the organization (Raspberry Pi Foundation) responsible for creating and marketing […]

The Heartbleed Vulnerability

By now it’s safe to assume that you have at the very least heard the term “Heartbleed.” If you haven’t, have you been…hiding in a cave? Because we live in a world dominated by technology and technological threats you may have heard on your local news about the Heartbleed bug and ignored the threat. I […]