BlackCSI Blog

BlackCSI has been serving the Pennsylvania area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
Ruthann Black, President, Chief Executive Officer and founder of BlackCSI has over 25 years of experience in Training, Professional Business Development and IT Systems Integration. Prior to starting BlackCSI, she served as a Solutions Development Manager and Project Manager for IBM Corporation for 12 years.

Know Your Technology: Computer Forensics

Know Your Technology: Computer Forensics

Have you ever wondered where the commonly accepted perception of cyber investigations comes from? You might be surprised to find out that the world of suits, ties, and data terminals is far from the reality of what these investigations are--or, at least, considerably more dramatic. For today’s tech term, we’re going to get to the bottom of this by investigating what computer forensics really looks like.

2 Comments
Continue reading

A Brief Overview of Network Security

A Brief Overview of Network Security

The reliance the modern business has on its IT cannot be understated. As a result, to keep their computing network and infrastructure running efficiently, companies need to have a network and cybersecurity policy in place. With the development and use of organizational computer networks with multiple endpoints, understanding the basics of network security is helpful when implementing and employing network security systems. Today, we take a look at the parts of your network, their functions, and what you need to do to protect them.

0 Comments
Continue reading

How to Balance Your IT’s Value Against the Cost

How to Balance Your IT’s Value Against the Cost

No matter how you look at it, technology is expensive. You’ll rarely look at your IT invoices without cringing a little on the inside. However, it’s important that you take a glance at these every once in a while to understand just what you’re getting from your technology budget. Ultimately, you want to ensure that your IT purchases are yielding a positive return on investment, and therefore, providing value for your organization.

0 Comments
Continue reading

Tip of the Week: Work Commands for Google Home

Tip of the Week: Work Commands for Google Home

Does your organization leverage any of Google’s plethora of services or applications to achieve success? Google Assistant can also be a great asset for your organization as it can connect to your smart devices and speakers to create an extremely valuable tool. This week’s tip will discuss some of the best features of Google Assistant and how it can affect your professional environment.

0 Comments
Continue reading

How to Calculate if That Print Job Was Really Worth It

How to Calculate if That Print Job Was Really Worth It

There are a few sounds that are familiar to any office: keys clacking away, coffee being sipped (or slurped), and the rattling, squawking hum of the printer. Yet this image presents a crucial question: do you know how much your printer is costing your business each time it is used? In today’s blog, we’ll review how you can calculate this investment.

0 Comments
Continue reading

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

4 Comments
Continue reading

Sorry Han, When it Comes to Security, You Need to Know the Odds

Sorry Han, When it Comes to Security, You Need to Know the Odds

Star Wars is a cultural phenomenon. For the past 40+ years audiences from all around the world have become enthralled with the characters, the story, and the technology that existed a long time ago in a galaxy far, far away. Who knew that it was also a wonderful lesson in modern IT security?For today’s blog, we look at three situations that happened in Star Wars: A New Hope; and, how, if proper IT strategies were put in place, the Empire would have been able to protect its greatest asset.

5 Comments
Continue reading

Tech Term: Chromebook

Tech Term: Chromebook

It seems like everywhere you go, you can see a Chromebook. These specialty laptops have a few features that make them highly desirable in some circumstances, and poorly suited to others. Seeing as ‘Chromebook’ is our Tech Term for this week, why not take a few moments and examine them a little closer?

1 Comment
Continue reading

Is True Wireless Charging Around the Corner?

Is True Wireless Charging Around the Corner?

Wireless charging is a challenging technology. While the benefits are clear as day (imagine, only having the one cord to supply power to the charger itself!), the concept has yet to see the mass implementation and adoption one would expect it to. Today, we’ll look at this underperforming technology’s history, a few applications that could be seen in the future, and the holdups it is seeing currently.

0 Comments
Continue reading

BlackCSI Disrupts Cybersecurity Industry with New Program

BlackCSI, a leading managed technology services provider, announced today that the company has launched a cybersecurity security-as-a-service program designed to protect businesses from daily attacks. BlackCSI’s cybersecurity-as- a-service is an all inclusive offering that combines best of breed technology for firewalls, antivirus software, phishing prevention, dark web monitoring, and data backup.

0 Comments
Continue reading

4 Strategies to Improving Your Backups

4 Strategies to Improving Your Backups

How does your business leverage data backup? Depending on the way your business functions and your specific needs, your data backup solution will vary from other organizations in your industry. Yet, one thing is absolutely certain, and it’s that your organization can’t afford to not implement some type of data backup system. In the event of a data loss scenario, you won’t want to be left wondering if you could have prevented it with a little proactive action.

0 Comments
Continue reading

Tech Term: Hard Drive

Tech Term: Hard Drive

Most computer users know of the hard drive, but how many actually know what it does? Depending on who you ask, you’ll get different degrees of answers. It’s rare that you’ll encounter the ordinary person who knows what the hard drive is, as well as how it works or what it does. This week’s tech term is the hard drive, so let’s dig in.

1 Comment
Continue reading

Bias Can Impact Your Business from Within

Bias Can Impact Your Business from Within

Despite what you may have heard, a bias is not an inherently bad thing. However, if not considered rationally, a bias can easily lead you to make a business decision that does more harm than good. Researchers have uncovered why we hold the biases we do, and how we might work to overcome them.

0 Comments
Continue reading

BlackCSI’s Melissa Cornell Presents to Safety Roundtable About Increasing Risk of Cyber Attacks on Small to Mid-Sized Businesses

Melissa Cornell of BlackCSI was recently invited to speak as the expert presenter to IEC’s Safety Roundtable. The presentation covered how the increased volume and frequency of cyber attacks has made an impact on small to mid-sized businesses. As cyber criminals refine their techniques, small to mid-sized companies may be at a higher risk than larger entities.

0 Comments
Continue reading

How to Keep Your Mobile Data Safe

How to Keep Your Mobile Data Safe

Oh no. You slap your pockets in a sudden panic, but you only confirm what you suddenly feared: you’ve lost your mobile device, the one with all of your business data on it. You haven’t an idea where you might have left it - all you know is that it’s just... gone.

0 Comments
Continue reading

Tech Term: Router

Tech Term: Router

The more that people depend on mobile devices and portable computers to get work done, the more businesses have to consider how to manage their organization’s wireless network. The router is the piece of hardware that makes the wireless network possible. Today, we will talk a little bit about the router and how its configuration can dictate the strength, reliability, and security of your business’ wireless network.

0 Comments
Continue reading

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

0 Comments
Continue reading

What’s the Best Form of Authentication on Your Mobile Device?

What’s the Best Form of Authentication on Your Mobile Device?

As smartphones have become smarter, they have become filled with more and more data that needs to be kept private for the owner’s safety and security. This is why it is fortunate that there are also more ways to secure a smartphone against unauthorized use. We’ll examine the many options to devise which is the most secure.

0 Comments
Continue reading

Tip of the Week: Spotting Fake Apps on the Google Play Store

Tip of the Week: Spotting Fake Apps on the Google Play Store

Mobile devices have countless uses, all of which enable users to get the most out of them. But what if all of your efforts at finding the best applications for the job are wasted on finding a fraudulent app on the Google Play Store? Believe it or not, the Google Play Store has its fair share of malware available for download in all types of disguises. Here are a few tips to help you avoid installing them in the first place.

0 Comments
Continue reading

Can You Recognize the Risks that Appear in Your Email?

Can You Recognize the Risks that Appear in Your Email?

Email is often touted as a favorite medium for launching cyberattacks against businesses and individuals. This is because it’s easy to hide the true intent behind an email attack within its contents, whether they are embedded images in the message itself, or links to external sources. How can you know for sure whether the links in your email inbox are legitimate?

0 Comments
Continue reading

Latest News & Events

Technology Assurance Group Gathers Top Managed Technology Services Providers to Discuss the Future of Cloud IT, Cybersecurity, and Business Innovation HARRISBURG, PA – March 28, 2025 – BlackCSI, a leading managed technology services provide...

Latest Blog

Running a small business is already a juggling act. Now toss managing IT into the mix and watch the balls start to bounce in every direction. IT for small businesses isn’t just plugging in a few computers and setting up Wi-Fi. It’s an ever-...

Contact Us

Learn more about what BlackCSI
can do for your business.

(717) 620-3042

BlackCSI
124A West Harrisburg Street
Dillsburg, Pennsylvania 17019

close