Phish Testing: How Does Your Team Score?
Phishing attacks are evolving and growing more serious every second. They are a form of social engineering that target faults in human nature rather than technology. This is done in an effort to obtain important information. Many times this involves ...
Security for Online Shopping
There’s no denying the fact that it’s much easier to shop from home during the holidays. Not only do you avoid hot crowded stores with long lines, but you don’t have to worry about your items being out of stock ...
BYOD Without a Breach
Bring Your Own Device (BYOD) policies have become less of a trend and more of a requirement. By 2018, 78.48% of organizations in the US had instituted a BYOD policy. This kind of policy allows you to bring your own ...
Webinar: Hacking the Hacker
Here is a recording of our Webinar from 11/21/2019, Hacking the Hacker... Don't be a Sitting Duck. Our two panelists, John Prenderville and Zach Koopman cover all things security, including phishing, ransomware, and security awareness training.
December 2019
WELCOME WE'VE LAUNCHED OUR NEW WEBSITE! The TNS Group is proud to announce the launch of our new website. We have a new look, a new feel and are excited about all that the New Year ...
November 2019
WELCOME November is upon us and you know what that means, the holidays are coming. Things can get hectic during the upcoming months so we urge you to stop and smell the roses, or the pumpkin pie in this case. ...
October 2019
WELCOME October is a very exciting month filled with hot cider and hayrides. Not only will fall be in full swing, but more importantly, it’s Cybersecurity Month! It’s a great time to educate yourself on the safest ways to use ...
September 2019
WELCOME The summer season is coming to an end and soon we will be heading into fall. A new work year will be starting and with that brings the excitement of new opportunities on the work front. The summer crowds ...
August 2019
WELCOME Summer is upon us and we hope that you’re taking some time for yourself to relax and enjoy the warm weather. Whether you’re spending that time on the beach or in the backyard with family by the pool, you ...
July 2019
WELCOME We hope that you all have a safe and wonderful July 4th holiday! Some of you may be extending the holiday and we hope that you soak in all that summer has to offer. It’s time to take in ...
June 2019
WELCOME Time for spring cleaning! Whether it be your desk at work, that pesky pile of mail on your kitchen table or your closet of clothes you’ve been meaning to go through. Take the next few weeks to refresh and ...
May 2019
WELCOME Time for spring cleaning! Whether it be your desk at work, that pesky pile of mail on your kitchen table or your closet of clothes you’ve been meaning to go through. Take the next few weeks to refresh and ...
Mobile Device Management Solutions to Protect Your Data
The use of personal devices in the workplace has now become standard. Bring Your Own Device (BYOD) policies at work have increased efficiency and decreased spending. Most employees feel more comfortable and confident working on their own phones and tablets ...
Mobile Phishing: Don't Click the Link
Let’s face it, in today’s world it’s difficult not to check your mobile device frequently. On top of using devices for communication purposes, they can be used for anything else you can think of too. Lost? Just open your maps ...
Tips for Cybersecurity Month!
In honor of October being Cybersecurity month, we released a set of tips to help keep you safe in the cyber world. Here is a highlight reel with some cybersecurity suggestions for your day-to-day life.
Are You Locking Your Devices?
The lock screen of today is the old login screen of the past. Many of you may feel that you have nothing to hide, so leaving your devices open doesn’t carry much significance to you. We ask that you reconsider ...
Cookies and Your Browser History
As an internet user you probably find it convenient when a website loads quickly or auto-fill’s your credentials. It cuts waiting time in half and you don’t have to rack your brain for the variation of your usual password that ...
Social Engineering is Here to Stay
Social Engineering is the use of deception to manipulate others into releasing confidential and personal information. This personal information can include anything from credit card numbers to email addresses to personal details about a banking account like your username and ...
Cybersecurity Month: Time to Educate Your Team
As a business owner it’s your responsibility to take certain cybersecurity precautions. Making sure you have the correct firewalls and policies in place are important ways to keep your business protected. Although you have a lot of control over your ...
Business Etiquette: Top Tips
Let’s face it, we all have an online footprint and presence in the workplace. Even though we aren’t surfing online and posting in the same ways, we still leave a trail behind us that’s arguably even more monitored than on ...
4 Ways to Better Utilize Your MSP
The benefits of outsourcing IT are endless. There is no need to constantly wait for your technical issues to be fixed anymore. With an IT Managed Service Provider (MSP) you’ll have an entire team of IT professionals on call 24/7 ...
Everyone Needs an MSP for Cybersecurity
Never underestimate the importance of cybersecurity. The work environment is evolving quickly. Today, most work is done on a digital level requiring employees to use a minimum of one device for work, though most use more. Although Bring Your Own ...