US Canada China
Search
Back 

Blog

Wednesday, May 1, 2019

1

May

2019

Technology Integration Group Named One of 2019 Tech Elite Solution Providers by CRN®

Tech Elite 250 List Recognizes Highest Achieving IT Solution Providers in Vendor Certifications

San Diego – April 30, 2019 – Global Solution Provider, Technology Integration Group (TIG), announced today that CRN®, a brand of The Channel Company, has named TIG to its 2019 Tech Elite 250 list. This annual list honors a select group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading technology suppliers, scaled to their company size. These companies have distinguished themselves with multiple, top-level IT certifications, specializations, and partner program designations from the industry’s most prestigious technology providers.

To compile this annual list, The Channel Company’s research group and CRN editors work together to identify the most customer-beneficial technical certifications in the North American IT channel. Companies who have earned these elite designations— which enable solution providers to deliver premium products, services and customer support—are then selected from a pool of online applicants.

Number of views (307) Article rating: No rating
Read more

Categories: TIG News

Tags:

Tuesday, January 15, 2019

15

Jan

2019

Six Security Practices to Teach Employees

No matter how strong your security and defense systems may be, there is always one flaw: human error.

No matter how big or small a company is, the fact behind employees being the biggest threat will never change for IT security. However, there are steps that can reduce the effect of human error, one of which is educating your employees on basic fundamentals of security and awareness.

Other steps that you can take include:

  • Avoiding Unknown Networks. Sure, you can send an email through a Starbucks Wi-Fi network, but these are open doors for hackers to gain access to a device that may contain corporate data.
  • Always Have a Passcode. Everything has gone mobile, and that includes the devices we use both at work and at home. Most of our devices don’t require passcodes, but they should. Teaching employees the importance of having every device require a passcode will pause the threat of an unknown visitor gaining access to critical information.
  • Watching What You Click. Antivirus software isn’t always the answer. Employees have become relaxed in what they click because of the “protection software.” Helping them understand that this is not the case, and the consequences of opening up documents from unknown people or websites.
  • Do Not Share Credentials. Purchase additional login accounts rather than sharing one account. That mentality needs to be done away with, and employees should learn value behind guest or role-based accounts. This is what keeps systems safe and secure.,/li>

Saying Something If You See Something. Keeps your eyes open for any suspicious documents, emails, or websites. Awareness goes a long way towards preventing cyber-attacks and hacks.

Number of views (4007) Article rating: 3.0
Read more

Categories: TIG Blog

Tags:

Thursday, January 3, 2019

3

Jan

2019

What’s Your Data Worth?

Have you ever wondered what your data is worth on the dark web? Recently, RSA went undercover in the dark web to find out just how pervasive “dump” selling was and what your information is worth.

RSA and Fox Business News Report found the following:

Social

  • Instant Messaging ($1-$5)
  • Emails ($1-$3)
  • Dating Sites ($1-$10)
  • Social Media Websites ($3)

Finance

  • Financial Services ($7-$10.50)
  • Online Money Transfer Services ($0.0-$15.50)
  • Bank Accounts ($3-$24)
  • Credit Card Websites ($3-$5)
  • Accounts from Recent Breach ($1)

Travel/Leisure

  • Airlines ($3-$10.50)
  • Hospitality Services ($0.7-$1.50)

The scariest part of these findings is that dating accounts have quickly become the third & fourth most valuable type of account to resell on the dark web. The reason? It provides the attacker with enhanced knowledge giving them the ability to generate a ‘Synthetic’ Identity. They glean intimate personal details about your life to create a new physical and virtual you in order gain credit, buy property, and obtain enough knowledge to take over your existing accounts by answering deeper security questions such as, “What was your first car?”, “What’s your dad’s middle name?”, or “Who was your favorite teacher in high school?”

So why do businesses & organizations care about this new trend?

Many organizations deploy technologies that are based on the same “Personal Question” methodology. An attacker who knows the answers to these questions can gain access to password reset mechanisms. Likewise, employees often use similar passwords across work and personal sites. More cases are being seen involving blackmail and corporate espionage – when people feel subject to embarrassment or criticism over information they posted on a dating site or social media outlet, they are more susceptible to do unnatural things to keep that information private.

How are you protecting not only your networks and Intellectual Property, but how are you educating your users and protecting them?

Be Vigilant, Stay Aware!

Christian Rolland, BVP, CCDP, CCNP+S, CCNP+R&S
Sr. Practice Director, Enterprise Networking

Number of views (5080) Article rating: 5.0
Read more

Categories: TIG Blog

Tags:

Tuesday, March 6, 2018

6

Mar

2018

Technology Integration Group Recognized for Excellence in Managed IT Services

Trusted Expert in Technology

San Diego – March 7, 2018 – Global Solution Provider, Technology Integration Group (TIG), announced today that CRN®, a brand of The Channel Company, has named TIG to its 2018 Managed Service Provider (MSP) 500 list in the Elite 150 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Their offerings help companies navigate the complex and ever-changing landscape of IT, improve operational efficiencies, and maximize their return on IT investments.

In today’s fast-paced business environments, MSPs play an important role in helping companies leverage new technologies without straining their budgets or losing focus on their core business. CRN’s MSP 500 list shines a light on the most forward-thinking and innovative of these key organizations.

The list is divided into three categories: the MSP Pioneer 250, recognizing companies with business models weighted toward managed services and largely focused on the SMB market; the MSP Elite 150, recognizing large, data center-focused MSPs with a strong mix of on-premises and off-premises services; and the Managed Security 100, recognizing MSPs focused primarily on off-premise, cloud-based security services.

TIG Managed IT services allows better business options. Allowing delegation of IT operations to a trusted expert who specializes in the entirety or portions of a business’ IT systems including round-the-clock monitoring, issue resolution, reporting, and more. “Managed service providers have become integral to the success of businesses everywhere, both large and small,” said Bob Skelley, CEO of The Channel Company. “Capable MSPs enable companies to take their cloud computing to the next level, streamline spending, effectively allocate limited resources and navigate the vast field of available technologies. The companies on CRN’s 2018 MSP 500 list stand out for their innovative services, excellence in adapting to customers’ changing needs and demonstrated ability to help businesses get the most out of their IT investments.”

“Cloud computing has allowed managed IT services to expand beyond the regions and borders that would limit the average break/fix IT through the adoption of Software as a Service (SaaS) technologies, as well as Infrastructure as a Service (IaaS) and others. This expertise delivers to our clients cost reduction in IT that can scale at a rate dramatically larger and faster than in-house IT operations” Bruce Geier, President & CEO of Technology Integration Group.

The MSP500 list is featured in CRN and online at www.CRN.com/msp500.

About TIG
TIG is a premier full-service IT Solutions Provider with 36 years of experience providing end-to-end technology and IT infrastructure solutions in 70 countries. In addition to the company’s headquarters in San Diego, TIG has 25 offices located in Albuquerque, Atlanta, Denver, Eugene, Honolulu, Indianapolis, Irvine, Fort Walton Beach, Knoxville, Las Vegas, Livermore, Los Angeles, Pensacola, Philadelphia, Portland, Richmond, Sacramento, San Antonio, San Francisco Bay Area, Seattle, Tampa, Ottawa &Toronto Canada and Shanghai China. For more information visit www.tig.com ###

Number of views (4491) Article rating: 3.7
Read more

Categories: TIG News

Tags:

Tuesday, January 9, 2018

9

Jan

2018

Meltdown and Spectre Side-Channel Advisement

Meltdown and Spectre Side-Channel Advisement

– The Bottom Line
There have been so many articles, advisories, blogs and opinions shared regarding the Meltdown and Spectre Side-Channel vulnerability, it’s difficult to tell fact from FUD. All these data points may still leave you asking: How does all this affect me, my business and my clouds?

Bottom line up front: know what your computer systems are running and quickly apply the recommended patches to each of the vulnerable platforms. Don’t take this lightly, it’s a very serious situation, however exploiting this vulnerability is not easy nor is there a known instance of an exploit in the wild. If you are unsure if you are affected, TIG can help.

Why Look To TIG?
As a leading technology solution provider, TIG has long standing relationships with most of the top tier vendors that manufacturer the equipment that is subject to this published Meltdown and Spectre Side-Channel vulnerability. This relationship provides TIG with an inside track on present and future impact, exposure and recommendations on how to mitigate the risk of this wide-spread vulnerability. TIG is offering a Meltdown/Spectre assessment services which catalogs your organizations assets and assesses the possible points of exposure and makes specific recommendations to minimize risk to your infrastructure.

Number of views (5005) Article rating: 3.3
Read more

Categories: TIG Blog

Tags:

RSS
12345678910 Last

TIG is a single source IT solutions provider for businesses and organizations of all sizes.

TIG shares with its clients the strength of over 33 years of computer system integration experience and hundreds of long-term manufacturer alliances.


Quick Links

Copyright 2019 by Technology Integration Group