Skip to content
  • Managed IT
  • IT Services
  • Cloud Phone Service
  • Blog
  • Contact Us

Phone
269-290-7500

Email
[email protected]

Address
4341 S Westnedge Ave STE 1102
Kalamazoo, MI 49008
Directions

Hours
Monday to Friday: 8AM - 5PM

Technology Solutions of MITechnology Solutions of MI
  • Managed IT
  • IT Services
  • Cloud Phone Service
  • Blog
  • Contact Us
Get Help
Technology Solutions of MITechnology Solutions of MI
Free ai generated cybersecurity digital shield illustration
  • Cybersecurity

Micro-SaaS Vetting: The 5-Minute Security Check for Browser Add-ons

Browser add-ons have a funny reputation. They feel “small”. A quick install. A tiny productivity…

  • Josh HeystekByJosh Heystek
  • OnMay 15, 2026
Read MoreMicro-SaaS Vetting: The 5-Minute Security Check for Browser Add-ons
Free antivirus security privacy illustration
  • Online Presence

LinkedIn “Social Engineering”: Protecting Your Staff from Fake Recruitment Scams

A fake recruiter message is one of the cleanest social engineering tricks around because it…

  • Josh HeystekByJosh Heystek
  • OnMay 10, 2026
Read MoreLinkedIn “Social Engineering”: Protecting Your Staff from Fake Recruitment Scams
Free cyber security digital cyber illustration
  • Working from Home

“Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks

In the traditional office, a “Clean Desk” policy was a simple habit: shred the sensitive…

  • Josh HeystekByJosh Heystek
  • OnMay 5, 2026
Read More“Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks
Free list notes icon illustration
  • Working from Home

The Essential Checklist for Securing Company Laptops at Home

At home, security incidents don’t look like dramatic movie hacks. They look like stepping away…

  • Josh HeystekByJosh Heystek
  • OnApril 30, 2026
Read MoreThe Essential Checklist for Securing Company Laptops at Home
Free cloud computer backup illustration
  • Cloud

The 2026 Guide to Uncovering Unsanctioned Cloud Apps

If you want to uncover unsanctioned cloud apps, don’t begin with a policy. Start with…

  • Josh HeystekByJosh Heystek
  • OnApril 25, 2026
Read MoreThe 2026 Guide to Uncovering Unsanctioned Cloud Apps
A combination lock rests on a computer keyboard.
  • Cybersecurity

Stop Ransomware in Its Tracks: A 5-Step Proactive Defense Plan

Ransomware isn’t a jump scare. It’s a slow build. In many cases, it begins days,…

  • Josh HeystekByJosh Heystek
  • OnApril 20, 2026
Read MoreStop Ransomware in Its Tracks: A 5-Step Proactive Defense Plan
A piece of cardboard with a keyboard appearing through it
  • AI

How to Run a “Shadow AI” Audit Without Slowing Down Your Team

It usually starts small. Someone uses an AI tool to refine a difficult email. Someone…

  • Josh HeystekByJosh Heystek
  • OnApril 15, 2026
Read MoreHow to Run a “Shadow AI” Audit Without Slowing Down Your Team
Free cyber security technology network illustration
  • Cybersecurity

A Small Business Roadmap for Implementing Zero-Trust Architecture

Most small businesses aren’t breached because they have no security at all. They’re breached because…

  • Josh HeystekByJosh Heystek
  • OnApril 10, 2026
Read MoreA Small Business Roadmap for Implementing Zero-Trust Architecture
1 2 3 4 … 27Next
No more posts to load
No results

Posts

Free ai generated cybersecurity digital shield illustration

Micro-SaaS Vetting: The 5-Minute Security Check for Browser Add-ons

May 15, 2026
Free Person Writing on Paper Using Yellow and Black Pen Stock Photo

10 Tips to Help Small Businesses Get Ready for the Unexpected

May 11, 2023
Free Security Cyber illustration and picture

How to Use Threat Modeling to Reduce Your Cybersecurity Risk

April 10, 2023
black and orange card on brown wooden table

Is Your Online Shopping App Invading Your Privacy?

April 25, 2023
Free Sign Security vector and picture

9 NSA Best Practices for Securing Your Home Network

May 25, 2023

Trending now

Free ai generated cybersecurity digital shield illustration
Micro-SaaS Vetting: The 5-Minute Security Check for Browser Add-ons
Free Person Writing on Paper Using Yellow and Black Pen Stock Photo
10 Tips to Help Small Businesses Get Ready for the Unexpected
Free Security Cyber illustration and picture
How to Use Threat Modeling to Reduce Your Cybersecurity Risk
black and orange card on brown wooden table
Is Your Online Shopping App Invading Your Privacy?

Contact Info

  • Address: 4341 S. Westnedge Ave Suite 1102 Kalamazoo, MI 49008
  • Phone: 269-290-7500
  • Email: info@ts-mi.com

About us

  • About Organization
  • Our Clients
  • Our Stack

Business Hours

Monday – Friday

8:00 AM to 5:00 PM EST

Our Services

  • Managed IT Services
  • IT Services
  • Business Phone Service

Important Links

  • Portal Login
  • Privacy Policy
  • Cookies Policy
  • Terms & Conditions
  • Agent Install
  • Remote Support

Copyright © 2026 - Technology Solutions of MI