Mac 101: Troubleshooting

Emerging in 1984, Apple’s Macintosh computer, affectionately known as "The Mac," has taken an ever-growing position in the global market, with their market share increasing nearly 26% since 2010. The need for Mac computers is growing in the workplace, thus increasing ...

TNS Soars on List of Top Managed Service Providers in the World

The TNS Group jumps 34 spots in the MSPmentor 2017 edition of MSP 501, ranking amongst the elite top 200 providers globally. The MSP 501 is the Information Technology (IT) industry’s largest and most prominent ranking of leading Managed Service ...

How Long Does the Life of a Computer Span?

Depending on when you started with computer technology, personal computers were $6 or $7 thousand dollars and weren't very mobile. A computer, at that time, was very limited in what it could accomplish, and did so relatively slowly. Peripherals were ...

Myths About Migrating Email to the Cloud

How many business emails do you send per day?  Do you consider that your primary gateway to conducting business in this day and age?  Personal conversations are still important, but email seems to be the ticket in most day-to-day exchanges.  ...

Microsoft Office 365 for Your Business

Microsoft Office 365 turned 5 years old last June! It is important to understand what improvements have been made, over that period of time, to encourage businesses to move from on premise to cloud email.  While Microsoft continues to market ...

Why You Should Migrate Email to the Cloud

One hot button topic that is prevalent in today’s IT world is email hosting. Should your company migrate its email to the cloud, or continue to be hosted internally? A few years ago, “moving to the cloud” was seen as a ...

Value of IT Support at a Fixed Monthly Cost

IT services are becoming a challenge for so many companies and industries as the use of computers has been expanding in our everyday life, as well as, keeping us in touch with the world at large.  As individuals, we consistently ...

The Emotional Lure of Social Engineering

Social engineering can sound quite alluring to some.  The word “social” tends to have a positive connotation as it relates to our personal and professional lives.  Put the word engineering after it and it might remind you to call some ...

4 Steps to Take After a Security Breach

Security concerns should be a priority for businesses of all sizes. Hackers are more focused on finding security loopholes than on the size of the business.  Most small to mid-sized businesses (SMBs) tend to not make security as much of ...

Work from the Beach with Secure Access

We are living in an ever-changing world where technology has become a staple in both our personal and professional lives.  This lends itself to convenience and the opportunity to be productive and push tasks forward, outside of the office.  Haven’t we ...

The TNS Group Acquires Chelsea Computer

The TNS Group, a preeminent Managed IT Service Provider (MSP) headquartered in Stamford, CT, announced today that it has acquired Chelsea Computer, an established IT services firm in New York City. Both companies have come together as one united team, ...

Top 5 Ways to Guard Against Ransomware

Working for a Managed IT Services Provider (MSP) as a technology professional, I know the importance of security, and the many facets of it.   Working for an MSP we take a proactive approach to protecting our clients, however, it is important ...

Top 5 Must Haves for Network Security

Network Security can be a daunting topic for many businesses and their IT staff. It can be so daunting that business owners often push it to the side and go on with business as usual, but ignoring network security or ...

Microsoft Office 365 vs. Google Apps

What do a factory, a small retail chain, and a law firm all have in common?  “Not much,” may be the first answer that comes to mind, and you would be right. These three types of businesses all make money in different ...

Have You Outgrown Your IT Services Company?

When you first started your business, your technology requirements were probably minimal at best.  Any computer issue could be resolved with the help of a tech savvy brother-in-law or with a freelance expert, on a break-fix basis.  As your company began ...

Business Continuity and Disaster Recovery

Business Resilience Confused by the difference between Disaster Recovery Planning and Business Continuity Management? Now let’s add another term – Business Resilience. Put simply, business resilience literally means the ability of an organization to absorb the effects of an undesirable ...

Protect Your Data from Everyday Disasters

Data is the most vital asset to any organization.  Despite the rise in natural and human related disasters in the last few years, Disaster Recovery (DR) and Business Continuity Planning (BCP) are still not given the attention they deserve.  I ...

Do You Need a Tech Upgrade?

Anyone who buys a computer realizes very quickly that technology progresses at an extremely rapid pace. It seems by the time that you get your computer, plug it in, and set it up for use, there is a newer and ...

Are Phishing Attacks Angling for You?

Phishing is similar to an online con game where attackers send fraudulent email messages appearing to come from trustworthy sources to gain personal information.  These types of scams vary in their complexity and their attacker’s objectives, with spear phishing and ...