Phish Testing: How Does Your Team Score?

Phishing attacks are evolving and growing more serious every second. They are a form of social engineering that target faults in human nature rather than technology. This is done in an effort to obtain important information.  Many times this involves ...

Security for Online Shopping

There’s no denying the fact that it’s much easier to shop from home during the holidays. Not only do you avoid hot crowded stores with long lines, but you don’t have to worry about your items being out of stock ...

BYOD Without a Breach

Bring Your Own Device (BYOD) policies have become less of a trend and more of a requirement. By 2018, 78.48% of organizations in the US had instituted a BYOD policy.  This kind of policy allows you to bring your own ...

The Cloud and it's Benefits

Webinar: Hacking the Hacker

Here is a recording of our Webinar from 11/21/2019, Hacking the Hacker... Don't be a Sitting Duck. Our two panelists, John Prenderville and Zach Koopman cover all things security, including phishing, ransomware, and security awareness training.

December 2019

WELCOME WE'VE LAUNCHED OUR NEW WEBSITE! The TNS Group is proud to announce the launch of our new website. We have a new look, a new feel and are excited about all that the New Year ...

November 2019

WELCOME November is upon us and you know what that means, the holidays are coming. Things can get hectic during the upcoming months so we urge you to stop and smell the roses, or the pumpkin pie in this case. ...

October 2019

WELCOME October is a very exciting month filled with hot cider and hayrides. Not only will fall be in full swing, but more importantly, it’s Cybersecurity Month! It’s a great time to educate yourself on the safest ways to use ...

September 2019

WELCOME The summer season is coming to an end and soon we will be heading into fall. A new work year will be starting and with that brings the excitement of new opportunities on the work front.  The summer crowds ...

August 2019

WELCOME Summer is upon us and we hope that you’re taking some time for yourself to relax and enjoy the warm weather. Whether you’re spending that time on the beach or in the backyard with family by the pool, you ...

July 2019

WELCOME We hope that you all have a safe and wonderful July 4th holiday! Some of you may be extending the holiday and we hope that you soak in all that summer has to offer. It’s time to take in ...

June 2019

WELCOME Time for spring cleaning! Whether it be your desk at work, that pesky pile of mail on your kitchen table or your closet of clothes you’ve been meaning to go through. Take the next few weeks to refresh and ...

May 2019

WELCOME Time for spring cleaning! Whether it be your desk at work, that pesky pile of mail on your kitchen table or your closet of clothes you’ve been meaning to go through. Take the next few weeks to refresh and ...

Mobile Device Management Solutions to Protect Your Data

The use of personal devices in the workplace has now become standard. Bring Your Own Device (BYOD) policies at work have increased efficiency and decreased spending. Most employees feel more comfortable and confident working on their own phones and tablets ...

Firewalls For All

Mobile Phishing: Don't Click the Link

Let’s face it, in today’s world it’s difficult not to check your mobile device frequently. On top of using devices for communication purposes, they can be used for anything else you can think of too. Lost? Just open your maps ...

Tips for Cybersecurity Month!

In honor of October being Cybersecurity month, we released a set of tips to help keep you safe in the cyber world. Here is a highlight reel with some cybersecurity suggestions for your day-to-day life.

Are You Locking Your Devices?

The lock screen of today is the old login screen of the past. Many of you may feel that you have nothing to hide, so leaving your devices open doesn’t carry much significance to you.  We ask that you reconsider ...

Cookies and Your Browser History

As an internet user you probably find it convenient when a website loads quickly or auto-fill’s your credentials. It cuts waiting time in half and you don’t have to rack your brain for the variation of your usual password that ...

Social Engineering is Here to Stay

Social Engineering is the use of deception to manipulate others into releasing confidential and personal information. This personal information can include anything from credit card numbers to email addresses to personal details about a banking account like your username and ...

Cybersecurity Month: Time to Educate Your Team

As a business owner it’s your responsibility to take certain cybersecurity precautions. Making sure you have the correct firewalls and policies in place are important ways to keep your business protected. Although you have a lot of control over your ...

Business Etiquette: Top Tips

Let’s face it, we all have an online footprint and presence in the workplace. Even though we aren’t surfing online and posting in the same ways, we still leave a trail behind us that’s arguably even more monitored than on ...

4 Ways to Better Utilize Your MSP

The benefits of outsourcing IT are endless. There is no need to constantly wait for your technical issues to be fixed anymore. With an IT Managed Service Provider (MSP) you’ll have an entire team of IT professionals on call 24/7 ...

Everyone Needs an MSP for Cybersecurity

Never underestimate the importance of cybersecurity. The work environment is evolving quickly. Today, most work is done on a digital level requiring employees to use a minimum of one device for work, though most use more.  Although Bring Your Own ...