Skip to content
  • Managed IT
  • IT Services
  • Cloud Phone Service
  • Blog
  • Contact Us

Phone
269-290-7500

Email
[email protected]

Address
4341 S Westnedge Ave STE 1102
Kalamazoo, MI 49008
Directions

Hours
Monday to Friday: 8AM - 5PM

Technology Solutions of MITechnology Solutions of MI
  • Managed IT
  • IT Services
  • Cloud Phone Service
  • Blog
  • Contact Us
Get Help
Technology Solutions of MITechnology Solutions of MI
Free attack unsecured laptop vector
  • Cybersecurity

The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)

For years, enabling Multi-Factor Authentication (MFA) has been a cornerstone of account and device security.…

  • Josh HeystekByJosh Heystek
  • OnFebruary 25, 2026
Read MoreThe MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)
Free cloud security database vector
  • Cloud

The Daily Cloud Checkup: A Simple 15-Minute Routine to Prevent Misconfiguration and Data Leaks

Moving to the cloud offers incredible flexibility and speed, but it also introduces new responsibilities…

  • Josh HeystekByJosh Heystek
  • OnFebruary 20, 2026
Read MoreThe Daily Cloud Checkup: A Simple 15-Minute Routine to Prevent Misconfiguration and Data Leaks
Free cybercrime security scam vector
  • AI

The “Deepfake CEO” Scam: Why Voice Cloning Is the New Business Email Compromise (BEC)

The phone rings, and it’s your boss. The voice is unmistakable; with the same flow…

  • Josh HeystekByJosh Heystek
  • OnFebruary 15, 2026
Read MoreThe “Deepfake CEO” Scam: Why Voice Cloning Is the New Business Email Compromise (BEC)
Free read only readonly locked vector
  • Cybersecurity

Securing the ‘Third Place’ Office: Policy Guidelines for Employees Working from Coffee Shops and Coworking Spaces

The modern office extends far beyond traditional cubicles or open-plan spaces. Since the concept of…

  • Josh HeystekByJosh Heystek
  • OnFebruary 10, 2026
Read MoreSecuring the ‘Third Place’ Office: Policy Guidelines for Employees Working from Coffee Shops and Coworking Spaces
Free ai generated artificial intelligence typography vector
  • AI

AI’s Hidden Cost: How to Audit Your Microsoft 365 Copilot Usage to Avoid Massive Licensing Waste

Artificial Intelligence (AI) has taken the business world by storm, pushing organizations of all sizes…

  • Josh HeystekByJosh Heystek
  • OnFebruary 5, 2026
Read MoreAI’s Hidden Cost: How to Audit Your Microsoft 365 Copilot Usage to Avoid Massive Licensing Waste
scrabble-letters-spelling-saas-on-a-wooden-tabl
  • IT Management

The Smarter Way to Vet Your SaaS Integrations

Your business runs on a SaaS (software-as-a-service) application stack, and you learn about a new…

  • Josh HeystekByJosh Heystek
  • OnJanuary 30, 2026
Read MoreThe Smarter Way to Vet Your SaaS Integrations
shallow-focus-photography-of-macbook
  • IT Management

How to Use Conditional Access to Grant and Revoke Contractor Access in 60 Minutes

Managing contractor logins can be a real headache. You need to grant access quickly so…

  • Josh HeystekByJosh Heystek
  • OnJanuary 25, 2026
Read MoreHow to Use Conditional Access to Grant and Revoke Contractor Access in 60 Minutes
Free button icon symbol vector
  • Cybersecurity

How to Implement Zero Trust for Your Office Guest Wi-Fi Network

Guest Wi-Fi is a convenience your visitors expect and a hallmark of good customer service.…

  • Josh HeystekByJosh Heystek
  • OnJanuary 20, 2026
Read MoreHow to Implement Zero Trust for Your Office Guest Wi-Fi Network
1 2 3 4 … 25Next
No more posts to load
No results

Posts

Free Person Writing on Paper Using Yellow and Black Pen Stock Photo

10 Tips to Help Small Businesses Get Ready for the Unexpected

May 11, 2023
Free Security Cyber illustration and picture

How to Use Threat Modeling to Reduce Your Cybersecurity Risk

April 10, 2023
black and orange card on brown wooden table

Is Your Online Shopping App Invading Your Privacy?

April 25, 2023
Free Sign Security vector and picture

9 NSA Best Practices for Securing Your Home Network

May 25, 2023
Free Attack Unsecured vector and picture

What Is Push-Bombing & How Can You Prevent It?

June 2, 2023

Trending now

Free Person Writing on Paper Using Yellow and Black Pen Stock Photo
10 Tips to Help Small Businesses Get Ready for the Unexpected
Free Security Cyber illustration and picture
How to Use Threat Modeling to Reduce Your Cybersecurity Risk
black and orange card on brown wooden table
Is Your Online Shopping App Invading Your Privacy?
Free Sign Security vector and picture
9 NSA Best Practices for Securing Your Home Network

Contact Info

  • Address: 4341 S. Westnedge Ave Suite 1102 Kalamazoo, MI 49008
  • Phone: 269-290-7500
  • Email: info@ts-mi.com

About us

  • About Organization
  • Our Clients
  • Our Stack

Business Hours

Monday – Friday

8:00 AM to 5:00 PM EST

Our Services

  • Managed IT Services
  • IT Services
  • Business Phone Service

Important Links

  • Portal Login
  • Privacy Policy
  • Cookies Policy
  • Terms & Conditions
  • Agent Install
  • Remote Support

Copyright © 2026 - Technology Solutions of MI