News


Demonstrating Compliance With Data Security Regulations Can Be Easy If You Are Prepared

Keep a close watch on IT system access These days, most businesses are subject to data protection laws or regulations of one kind or another. Violations often come with pretty stiff penalties. To help demonstrate you are compliant with access control requirements, you should have clear policies and procedures about who gets access to what,…

Continue reading

TSTS Virtual Event: Defending Network Edges with the Zero Trust Access Model

Lunch gift cards will be provided for the first 20 participants that register and attend. Event Description There were 96% more network breaches in 2020 than in 2019. The main driver of the sudden increase in breaches is the introduction of new network edges brought on by changes in what constituted a “normal” business network.…

Continue reading

TSTS Virtual Event: Keeping Students Safe and Engaged in a Modern World

Learn how to keep students safe and engaged in any learning environment with Securly. Receive a free lunch gift card for attending.  Event Description School leaders, teachers, and parents look to admins to provide students with a safe, high-quality education experience—even as many schools continue to shift between in-person, 100% remote, or hybrid learning. As…

Continue reading

What is the Best Way to Change Your Passwords?

You change your clothes. You change your oil. Make sure you also change your passwords. An alert pops up on your computer: It is time to change your password again. Sigh. Fine. You will just change from password4! to password5! and― Not so fast. Regular password changes are meant to make sure that even if…

Continue reading

How Strong Are Your Passwords?

  Strong Security Starts with Strong Passwords If you use the same password for multiple systems―online shopping, email, your company’s cloud bookkeeping solution, etc.―you are not alone. Even Facebook founder Mark Zuckerburg is guilty of this. In 2016 his LinkedIn credentials were compromised in a major breach, giving hackers access to his Twitter account, too,…

Continue reading

Microsoft Exchange On-Premise Server Exploit

Twin State Technical Services received notification on the morning of Wednesday, March 3, regarding four (4) unique 0-day vulnerabilities that were discovered and affecting Microsoft Exchange Server versions 2013, 2016, and 2019. The notification also disclosed that threat actors were known to be actively exploiting these vulnerabilities in the wild.   The response from the Microsoft Exchange Team can be found here: https://techcommunity.microsoft.com/t5/exchange-team-blog/released-march-2021-exchange-server-security-updates/ba-p/2175901   Additional…

Continue reading

5 Microsoft 365 Security Configurations You Should Make Right Now

Is your Microsoft 365 business account suffering from misconfiguration? This is when your security settings aren’t where they should be. There are many Quad-Cities area business owners that use their cloud platforms “out of the box.” They never explore additional security settings that could provide better protection for their data and accounts. Did you know…

Continue reading

TSTS Virtual Event: Survival or Success: You Choose!

  Learn 7 steps to consistently winning in a changing world and how to stay motivated and on track to getting what you really want. Join the meeting from your computer, tablet or smartphone. https://global.gotomeeting.com/join/138472573 You can also dial in using your phone. United States: +1 (646) 749-3112 Access Code: 138-472-573 New to GoToMeeting? Get…

Continue reading

What Business Insights Can I Find from Website Analytics?

So, you’ve got your website built, online, and receiving visitors… now what? Getting started with your website as your online storefront is just the first step. Your business site doesn’t exist in a vacuum. It’s gathering data 24/7 about which pages are most popular, which buttons are getting the most clicks, and which pages are turning…

Continue reading