YouTube - BizTalk

Frank breaks down Microsoft’s latest Copilot price drop and new SMB bundles that make AI adoption both smarter and more affordable.

In this episode, we share a real-world story about a former client who left CTS for another IT provider, believing they’d get better security.

In this episode, I share insights from a recent week on the road—meeting clients, partners, vendors, and team members in person. After years of relying on Microsoft Teams and Zoom, it was refreshing to reconnect face-to-face.

In this special Thanksgiving episode, the CTS team comes together to reflect on what we’re most thankful for—both professionally and personally.

Global Internet Outage – AWS and DNS

In this episode, Frank Stephens dives into the unprecedented global Internet outage that occurred on October 20, 2025, lasting 15 hours and affecting thousands of applications and websites.

Cybersecurity Non-Negotiables – Part 4

In Part 4 of our Cybersecurity Awareness Month series, we dive into the backbone of modern cybersecurity: Managed Extended Detection and Response (MXDR) and the Security Operations Center (SOC).

Cybersecurity Non Negotiables – Part 3

In Part 3 of our Cybersecurity Awareness Month series, CTS CEO Frank Stephens dives into one of the most overlooked yet essential pillars of cybersecurity: Security Awareness Training (SAT).

Cybersecurity Non Negotiables – Part 2

In part two of our 4-part Cybersecurity Awareness Month series, Frank Stephens outlines another foundational cybersecurity solution that every organization must implement—no exceptions.

C

In this kickoff episode of our 4-part Cybersecurity Awareness Month series, CTS CEO Frank Stephens outlines the three foundational cybersecurity solutions that every organization must implement—no exceptions.

C

October is Cybersecurity Awareness Month, and CTS is proud to launch a special podcast series dedicated to helping organizations stay informed and prepared. While many IT companies use this month to promote their cybersecurity products, CTS is taking a different approach—focusing on education and awareness.

In this episode, Frank Stephens is joined by Heather Gehrke, who leads the CTS deployment group’s development efforts. Together, they dive into the best practices for scoping and delivering successful development projects—from small websites to large-scale eCommerce platforms and custom mobile applications.

In this episode, Frank Stephens sits down with two of CTS’s top migration experts—Ceasar and Blazej—to unpack the massive effort behind upgrading thousands of client systems from Windows 10 to Windows 11. With Windows 10 reaching end-of-life (EOL) on October 14, 2025, the pressure has been on to mitigate risks and ensure smooth transitions.

In this episode, Frank Stephens sits down with Ceasar to explore one of the most pressing cybersecurity threats facing organizations today: phishing emails. Ceasar walks through real-world examples of phishing attempts, highlighting the subtle cues that can help employees identify and avoid them.

In this episode, Frank Stephens welcomes Simon Jakubczak to explore the evolving technology landscape in the manufacturing sector. With CTS’s deep roots in supporting manufacturing clients since its inception, the conversation dives into practical, impactful trends that are shaping how manufacturers operate, scale, and secure their environments.

In this episode, Frank Stephens sits down with Nick from the CTS team to tackle a critical topic: what to do when you discover a cybersecurity breach. From immediate containment steps to long-term recovery strategies, they break down the essential actions every business should take to minimize damage and restore trust.

In this episode, Frank Stephens sits down with Ceasar to explore how Microsoft OneDrive can transform the way businesses—big or small—manage their files, collaborate securely, and stay productive from anywhere. Whether you’re a solo entrepreneur or leading a large enterprise, this conversation breaks down the practical benefits of cloud storage, seamless integration with Microsoft 365, and how OneDrive supports modern workflows.

In this episode of the CTS podcast, Frank Stephens is joined by Ceasar to explore the evolving technology landscape for accounting firms. Together, they dive into the critical importance of secure and scalable remote access, the latest developments in cybersecurity, and how artificial intelligence is reshaping everything from data analysis to client services.

In this episode of the CTS podcast, Frank Stephens sits down with Josh to explore the evolving landscape of virtualization for small businesses. They dive into how virtualization can streamline server deployment, enhance IT management, and deliver significant cost savings and operational efficiency for SMBs.

In this episode of the CTS podcast, host Frank Stephens is joined by team member Blazej to explore the most pressing technology trends shaping the future of law firms. From the foundation of a solid, scalable, and robust infrastructure—including on-premise servers, networking, and redundant internet connections—to the critical importance of managing hardware lifecycles, this conversation delivers actionable insights for legal professionals looking to modernize their operations.

In this episode, CEO Frank Stephens is joined once again by team member Anthony to explore a topic that continues to challenge businesses of all sizes: The risks of storing company data on local computers and laptops.

In this episode of the CTS podcast, we dive into the critical importance of implementing a robust Security Awareness Training (SAT) program for employees. Cybersecurity threats are evolving rapidly, and organizations must stay ahead by equipping their teams with the knowledge and tools to recognize and respond to risks.

In this episode, Frank Stephens tackles a question CTS clients are asking more than ever: Do smartphones really need cybersecurity protection? With mobile devices now storing sensitive business data—from emails to confidential files—the answer is a resounding yes.

In this episode, Frank Stephens, CEO of CTS, dives into the real-world challenges and opportunities of implementing AI in today’s business landscape. While AI continues to dominate headlines, Frank emphasizes that success lies not in chasing hype—but in crafting a strategy tailored to your organization’s unique needs.

There are over 40,000 MSPs (Managed Services Providers) in the USA, and not all of them are the same. Recently a previous client reached out for critical assistance, because they selected an MSP that could not deliver on their business needs.

In this episode, we are joined by Bill Martin, who is the President of Gateway Underwriters Agency. We sit down with a seasoned cyber insurance underwriter to demystify how cyber insurance is evaluated and priced—and why it’s become a critical pillar of modern risk management.

On April 24, 2025, CTS hosted a webinar called Accelerating the Business Value and Impact of CMMC, which brought together the unique perspective and expertise of our managed cybersecurity partner, High Wire – Overwatch!

In the last month, President Trump imposed tariffs to several countries including Mexico, Canada, Germany, Singapore, the Netherlands, Taiwan and the largest manufacturers of hardware… China.

Are you looking to start your career in IT technology and not sure what that looks like? Anthony started his career in tech a short time ago after graduating from college with a degree in computer science.

There are no businesses that have unlimited budgets, especially when it comes to technology and cybersecurity. Every organization wants their systems to be running efficiently, securely and protected… downtime is NOT an option, but there is a balance of monthly IT investment and the return you get.

Cybersecurity is not just a technology thing and our guest speaker Michael Moran from American Commercial Bank & Trust provides insight on how you can easily protect your business from bank fraud.

Did you know that business data hosted in any SaaS or cloud solution is YOUR responsibility? SaaS solutions ensure that they are meeting SLAs (service level agreements), which means that their solution is running properly, but typically your organization’s data is your responsibility.

Installing WiFi cameras in your home can be an efficient way to implement security. However, are the devices themselves secure?

In honor of Cybersecurity Awareness Month, CTS collaborated with its cybersecurity partner Overwatch by High Wire Networks to host a unique webinar.

There is a new trend called “cloud repatriation” in which businesses are starting to revert back to on-premise server per AWS (Amazon). From the marketing materials from Amazon, Microsoft, Google and other cloud providers, people were promised cost savings, less management efforts, higher uptime and more advanced cybersecurity. While some of those items are true, they haven’t been 100% accurate in some cases.

So your business has several cybersecurity solutions in place, but are they being actively managed and monitored? If not, then you aren’t being fully protected!

Looking to implement Starlink from SpaceX on a boat, RV or home/business? We’d like to share our experience of Starlink while island hopping in the Virgin Islands.

Ticketmaster had over 500 million customer records, including credit card numbers, stolen from the recent cyber breach!  Everyone needs to watch their credit cards from suspicious activity and make sure you lock/freeze your credit with Equifax, Experian, and TransUnion, which is pretty much free to do! 

Ransomware breaches happen daily, but do we REALLY understand the long-term effects of these malicious attacks?

When traveling, particularly in airports, we’ve all had the need to re-charge a smartphone or iPad before a flight after the typical delay. There are free USB port charging stations, but are they all safe?

MFA (Multi-Factor Authentication) is not just recommended, but it is a required solution to have in place for ALL systems if you want to have an effective and comprehensive cybersecurity program.

In a recent article, CIOs are rethinking their cloud strategies, which includes the possibility of bringing some technologies back inhouse. With Microsoft Azure and Amazon AWS increasing some of their cloud technologies, organizations are weighing the pros and cons of having their infrastructure in the cloud.

Even though it sounds like a Mission Impossible movie storyline, a finance executive at a multinational firm paid out over $25 million to a fraudster with the use of an AI tool to fool the person in thinking he was on a video conference with his CFO and fellow employees.

Today it was announced that the largest ever recorded data leak was found. Some are calling it “The Mother of All Breaches” with over 26 BILLION personal records and over 12 Terabytes of data found.

The need for additional bandwidth has increased since organizations have moved their systems to the cloud, and having robust Internet connectivity is critical for businesses that have moved their telephony to VoIP.

Happy Thanksgiving from CTS to all of our clients and their families! As always, we are grateful for our coworkers, clients and partners.

Zero day threats from AWS, Amazon and Azure can completely take down your eCommerce website, and unless you have a website application firewall (WAF) in place, it could cost you sales and customers!

Learning of a data leak or breach is the kind of scary story we NEVER want to hear. To protect your organization’s data from a loss stemming from a current or previous employee, there are solutions you can implement to mitigate this risk.

Attackers target people more directly than ever, and 95% of all cybersecurity issues can be traced back to human error. A company’s security posture is only as strong as their least secure employee.

Part of the CTS team just so happened to be in Las Vegas when the massive cyber attack hit.

Windows 2012 becomes EOL on October 10, 2023. This means any servers still running Windows 2012 after that date will no longer receive security updates, non-security updates, bug fixes, technical support, or online technical content updates.

As organizations move their systems to the cloud, their need for a robust, stable and near 100% up Internet connectivity is critical to their business.

Cybersecurity is top of mind for every business these days. The threat landscape is ever changing and the stakes are higher than ever. Join CTS and our partner Highwire for an afternoon of education and fun!

Mike Carver, Client Relationship Manager at CTS, joins us this episode to discuss what are the best technologies and processes that he utilizes for business development with both cultivating and managing leads.

Heather Gehrke, general manager of CTS , joins us this episode to discuss employee recruitment and retention, and what strategies she has used to build out the team at CTS.

Blazej Sadowski, who leads the CTS cybersecurity team, joins us this episode to discuss cybersecurity frameworks (PCI, HIPPA, CMMC, NIST, CIS, etc), their importance in guiding organizations in their cybersecurity needs and compliance, and our implementation of CIS at CTS.

Simon Jakubczak, IT Service Delivery Manager at CTS, joins us this episode to discuss the ease of IT onboarding and our simplified process in which new clients partner with CTS for IT Managed Services.

Our first guest speaker – Bob Duggan from GreenBee Technologies! CTS and GreenBee Technologies have been strategic partners for over a decade providing our clients with custom and effective solutions.

While traveling for work, you should NEVER use a public WiFi and utilize a personal & secure hotspot via your cell phone.

Multi-factor authentication (MFA) is a completely FREE cybersecurity solution to protect your Microsoft 365 and other cloud-based accounts.

I’m super excited to announce that after 20 years of IT consulting and providing digital marketing strategies for our clients, CTS – www.onlineCTS.com has finally decided to kick off our own YouTube channel!