5 Tips for a More Secure Office

  5 Tips for a More Secure Office Source:  Continuum 8/2/2019 When thinking about securing your business from cyber threats, the mind quickly turns to phishing, hacks and viruses, but there are many security threats in and around the office that can expose your business to a host of threats and cybersecurity issues. In conjunction […]

Phishing Emails – What to Look For

As with every organization, job functions vary by department, but we all share one common responsibility: protecting the private data of our clients, customers, partners, and co-workers.

Employee Security Training

Employee Security Training Human-error; we talk about it all the time, but what exactly do we mean?  Human-error occurs when an individual performs a task or does something with an unintended outcome.  It’s easy to point the finger at employee’s as being an organization’s weakest link, but without appropriate security awareness training provided by the […]

How Does the Dark Web Impact Small to Medium Size Businesses

  How Does the Dark Web Impact Small to Medium Size Businesses Identity theft is an unfortunate occurrence that is all too familiar with most business owners, but do those individuals know where the compromised data will end up?  Often, these business owners are unaware of the virtual marketplace where stolen data is purchased and […]

Critical PC Chip Security Vulnerability Found

ISSUE Computer researchers have recently found out that the main chip in most modern computers—the CPU—has a hardware bug. It’s really a design flaw in the hardware that has been there for years. This is a big deal because it affects almost every computer, including workstations and servers (and yes, even Apple iOS and MACs!) […]

IT Managed Services – Is it right for you?

What are Managed Services? Managed services is defined as the practice of outsourcing day-to-day management responsibilities and functions as a strategic method for improving operations and cutting expenses. Working with a managed services provider gives clients peace of mind and frees up valuable resources to focus on business productivity and profitability. What gets accomplished? Computer […]

Data Breach!

Data breach. If you click on the term data breach hyperlink will take you to have music to the company the term data breach because the consequences can truly be quite serious and destructive. Did you know that in the first four months of 2014 there were more than 300 publicly disclosed data breaches in […]

VDI – Virtual Desktop Infrastructure

My wife informed me that my original title for this post “VDI and other productivity enhancing TLAs” was confusing, she also told in my hair looked ridiculous…She was right about the hair so I quick changed the title to the current iteration. Virtual Desktop Infrastructure or VDI, is not new to the IT computing world. […]

Critical Data Storage and Recovery…What’s Your Plan?

Summer has officially kicked off in the state of Minnesota, the part of the world where CSI Onsite resides. For those of us who reside in Minnesota Since the readership for this blog is located across the globe allow me to briefly describe what Minnesota summer weather can be like. Minnesota is a state where […]