Blog

  • The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)

    The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)

    For years, enabling Multi-Factor Authentication (MFA) has been a cornerstone of account and device security. While MFA remains essential, the threat landscape has evolved, making some older methods less effective. The most common form of MFA, four- or six-digit codes sent via SMS, is convenient and familiar, and it’s certainly better than relying on passwordsRead…

  • The Daily Cloud Checkup: A Simple 15-Minute Routine to Prevent Misconfiguration and Data Leaks

    The Daily Cloud Checkup: A Simple 15-Minute Routine to Prevent Misconfiguration and Data Leaks

    Moving to the cloud offers incredible flexibility and speed, but it also introduces new responsibilities for your team. Cloud security is not a “set it and forget it” type task, small mistakes can quickly become serious vulnerabilities if ignored. You don’t need to dedicate hours each day to this. In most cases, a consistent, briefRead…

  • The “Deepfake CEO” Scam: Why Voice Cloning Is the New Business Email Compromise (BEC)

    The “Deepfake CEO” Scam: Why Voice Cloning Is the New Business Email Compromise (BEC)

    The phone rings, and it’s your boss. The voice is unmistakable; with the same flow and tone you’ve come to expect. They’re asking for a favor: an urgent wire transfer to lock in a new vendor contract, or sensitive client information that’s strictly confidential. Everything about the call feels normal, and your trust kicks inRead…

Archived posts

  • 10 Most Common Smart Home Issues (and How to Fix Them)

    Back when you were a kid, living in a “smart home” probably sounded futuristic. Something out of Back to the Future II or The Jetsons. Well, we don’t yet have flying cars, but we do have video telephones as well as smart refrigerators and voice-activated lights. But even the most advanced technology can have analogRead…

  • What Is Microsoft Security Copilot? Should You Use It?

    It can be challenging to keep up with the ever-evolving cyber threat landscape. Companies need to process large amounts of data. As well as respond to incidents quickly and effectively. Managing an organization’s security posture is complex. That’s where Microsoft Security Copilot comes in. Microsoft Security Copilot is a generative AI-powered security solution. It providesRead…

  • Smart Tactics to Reduce Cloud Waste at Your Business

    Cloud computing has revolutionized the way businesses operate. It offers scalability, flexibility, and cost-efficiency. But cloud services also come with a downside: cloud waste. Cloud waste is the unnecessary spending of resources and money on cloud services. These services are often not fully utilized or optimized. About 32% of cloud spending is wasted. This canRead…

TSD Managed Services
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.