Skip to content
  • Managed IT
  • IT Services
  • Cloud Phone Service
  • Blog
  • Contact Us

Phone
269-290-7500

Email
[email protected]

Address
4341 S Westnedge Ave STE 1102
Kalamazoo, MI 49008
Directions

Hours
Monday to Friday: 8AM - 5PM

Technology Solutions of MITechnology Solutions of MI
  • Managed IT
  • IT Services
  • Cloud Phone Service
  • Blog
  • Contact Us
Get Help
Technology Solutions of MITechnology Solutions of MI
a computer keyboard with a blue light on it
  • AI

6 Ways to Prevent Leaking Private Data Through Public AI Tools

We all agree that public AI tools are fantastic for general tasks such as brainstorming…

  • Josh HeystekByJosh Heystek
  • OnJanuary 15, 2026
Read More6 Ways to Prevent Leaking Private Data Through Public AI Tools
a-close-up-of-a-keyboard-with-a-blurry-background
  • IT Management

5 Ways to Implement Secure IT Asset Disposition (ITAD) in Your Small Business

Even the most powerful IT hardware today will eventually become outdated or faulty and will…

  • Josh HeystekByJosh Heystek
  • OnJanuary 10, 2026
Read More5 Ways to Implement Secure IT Asset Disposition (ITAD) in Your Small Business
Free gear machine mesh vector
  • Cloud

3 Simple Power Automate Workflows to Automatically Identify and Terminate Unused Cloud Resources

The cloud makes it easy to create virtual machines, databases, and storage accounts with just…

  • Josh HeystekByJosh Heystek
  • OnJanuary 5, 2026
Read More3 Simple Power Automate Workflows to Automatically Identify and Terminate Unused Cloud Resources
a computer keyboard with a padlock on top of it
  • IT Management

Your 2025 Privacy Compliance Checklist and What You Need to Know About the New Data Laws

Privacy regulations are evolving rapidly, and 2025 could be a pivotal year for businesses of…

  • Josh HeystekByJosh Heystek
  • OnDecember 30, 2025
Read MoreYour 2025 Privacy Compliance Checklist and What You Need to Know About the New Data Laws
Free computer file network vector
  • Online Presence

The SMB Guide to Making Your Website and Documents Digitally Accessible

Have you ever thought about how many potential customers leave your website because of accessibility…

  • Josh HeystekByJosh Heystek
  • OnDecember 25, 2025
Read MoreThe SMB Guide to Making Your Website and Documents Digitally Accessible
Free document cloud website vector
  • Cybersecurity

The Hidden Risk of Integrations: A Checklist for Vetting Third-Party Apps (API Security)

Modern businesses depend on third-party apps for everything from customer service and analytics to cloud…

  • Josh HeystekByJosh Heystek
  • OnDecember 20, 2025
Read MoreThe Hidden Risk of Integrations: A Checklist for Vetting Third-Party Apps (API Security)
a close up of a cell phone with an ai button
  • AI

The AI Policy Playbook: 5 Critical Rules to Govern ChatGPT and Generative AI

ChatGPT and other generative AI tools, such as DALL-E, offer significant benefits for businesses. However,…

  • Josh HeystekByJosh Heystek
  • OnDecember 15, 2025
Read MoreThe AI Policy Playbook: 5 Critical Rules to Govern ChatGPT and Generative AI
Free password login sign vector
  • Cybersecurity

How to Use a Password Manager and Virtual Cards for Zero-Risk Holiday Shopping

Have you ever been concerned about your credit card or personal data getting stolen while…

  • Josh HeystekByJosh Heystek
  • OnDecember 10, 2025
Read MoreHow to Use a Password Manager and Virtual Cards for Zero-Risk Holiday Shopping
Prev1 2 3 4 5 … 25Next
No more posts to load
No results

Posts

Free Person Writing on Paper Using Yellow and Black Pen Stock Photo

10 Tips to Help Small Businesses Get Ready for the Unexpected

May 11, 2023
Free Security Cyber illustration and picture

How to Use Threat Modeling to Reduce Your Cybersecurity Risk

April 10, 2023
black and orange card on brown wooden table

Is Your Online Shopping App Invading Your Privacy?

April 25, 2023
Free Sign Security vector and picture

9 NSA Best Practices for Securing Your Home Network

May 25, 2023
Free Attack Unsecured vector and picture

What Is Push-Bombing & How Can You Prevent It?

June 2, 2023

Trending now

Free Person Writing on Paper Using Yellow and Black Pen Stock Photo
10 Tips to Help Small Businesses Get Ready for the Unexpected
Free Security Cyber illustration and picture
How to Use Threat Modeling to Reduce Your Cybersecurity Risk
black and orange card on brown wooden table
Is Your Online Shopping App Invading Your Privacy?
Free Sign Security vector and picture
9 NSA Best Practices for Securing Your Home Network

Contact Info

  • Address: 4341 S. Westnedge Ave Suite 1102 Kalamazoo, MI 49008
  • Phone: 269-290-7500
  • Email: info@ts-mi.com

About us

  • About Organization
  • Our Clients
  • Our Stack

Business Hours

Monday – Friday

8:00 AM to 5:00 PM EST

Our Services

  • Managed IT Services
  • IT Services
  • Business Phone Service

Important Links

  • Portal Login
  • Privacy Policy
  • Cookies Policy
  • Terms & Conditions
  • Agent Install
  • Remote Support

Copyright © 2026 - Technology Solutions of MI