Announcing the Merger of Millennium IT With Tech Strategies

We’re excited to announce the merger of Millennium IT Services with Tech Strategies, Inc., effective immediately. What does this mean for you and your business…? Overall, you should not see a change – most everything will stay the same. Millennium IT and Tech Strategies have had a long business relationship and have worked together over for the last four years. You may have worked with the CEO of Tech Strategies in the past, Joel Eskelsen. If you have not, you should know that his knowledge...

Continue reading

What’s New in Kerio Connect 7.4

Get Hosted Kerio Connect! User Access Policies User Access Policies in Kerio Connect 7.4 gives administrators tighter management controls, while limiting security vulnerabilities of the mail server. Administrators can now set access permissions to Kerio Connect services such as Kerio WebMail, ActiveSync, or EWS, per user. For example, some organizations may want specific users to use Kerio WebMail instead of a desktop client like Microsoft Outlook, or restrict mobile device synchronization...

Continue reading

Tips to Protect Your Smartphone

With the increasing popularity of smartphones nowadays, more and more people are also falling victim to security threats like viruses, malware, spyware, privacy invasion and loss of confidential information. Given the dual use (for personal and work purposes), smartphones are an attractive target for hackers and criminals to retrieve sensitive information from. Moreover, as most smartphone users are still ignorant about the data security risks or are adopting a nonchalant or negligent attitude...

Continue reading

Simple Steps to Securing Your Smartphone

 While data usage among smartphone users has risen dramatically over the past few years, many users still remain ambivalent about the information security in such devices. While some might be aware of the importance of information security, most users still adopt a nonchalant or negligent attitude towards this issue. According to a recent survey of U.S. consumer attitudes about smartphones, less than half of the respondents consider security features to be important when deciding which smartphone...

Continue reading

Smartphone Security

According to a recent survey sponsored by AVG Technologies on U.S. consumers’ attitudes towards smartphone security, most of the smartphone users are unwittingly exposing themselves to several security risks. From the survey, the top five concerns of smartphone users are as follows. Being targeted by marketers based on how the phone is used for purchases, Internet browsing and even location. This often results in users receiving unwanted marketing ads or promotions on their smartphones. As people...

Continue reading

Protecting Yourself Against Smartphone Security Risks

Most smartphone users today are oblivious to the extent that they are exposing their personal and confidential information to certain risks when using their smartphones. According to a recent survey by the Ponemon Institute on smartphone use by U.S. consumers, 89% of the respondents use their smartphone for personal email and 82% use it for business email as well. A smaller percentage of the respondents also use their smartphone for online shopping and banking. Hence, the growing integration of...

Continue reading

Smartphones – Security Risks and Counter Measures

In the thrill of getting a new smartphone, many of us often forget or overlook the importance of data security. However, this is a particularly pertinent issue since most of us use the smartphone for both work and personal purposes. In the event of the data being hacked into, this would mean the invasion of personal privacy or even the loss of sensitive confidential work-related information. According to a recent survey by the Ponemon Institute, commissioned by AVG Technologies, on smartphone...

Continue reading

TSI Partners with 3CX

To better assist our clients in a variety of ways we have partnered with 3CX.  3CX Phone System is a software-based IP PBX for Windows which replaces traditional PBX hardware phones. It is based on the SIP standard and supports standard SIP software / hardware phones. It allows calls to be made via a VOIP service provider or via the regular PSTN. Easy to install and configure, it includes a web-based configuration interface, voice mail, auto attendant, call hunting and other features....

Continue reading

Referral Program

We appreciate it when you refer your friends and colleagues.  To thank you we’ve implemented a referral program that pays you.  Just tell your friends and colleagues, and then let us know when you recommend them, when they sign up, we’ll give you 5% of their service fees for the life of their account.

Continue reading

  • 1
  • 2

Get In Touch!

201 Canyon Crest Dr, Ste 100
Twin Falls, ID 83301

Phone: (208) 944-0031