GTSS Blog

GTS Solutions has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Thanks to one of Google’s researchers with the Zero Day Project, it has been discovered that LastPass has a major vulnerability as a result of a major architectural problem. This news comes on the heels of many other flaws the same researcher discovered within LastPass. However, based on what the researcher claims, these vulnerabilities were much less serious than his latest discovery.

0 Comments
Continue reading

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

In recent news, millions of records containing personal information were made available to the public in a sizable data leak, providing potential scammers with plenty of information to utilize in their schemes. These records were all part of a 53 GB database that was available for purchase from Dun & Bradstreet, a business service firm.

0 Comments
Continue reading

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for concern.

0 Comments
Continue reading

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Microsoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users that ignore these security patches are putting their system at unnecessary risk.

0 Comments
Continue reading

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

You don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan that has installed unwanted apps and malware to more than a million phones all over the world.

0 Comments
Continue reading

Alert: 7-Zip Software Can Leave Your System Vulnerable

Alert: 7-Zip Software Can Leave Your System Vulnerable

Software vulnerabilities can cause major issues for individuals and businesses. Cisco’s Talos Security Intelligence and Research Group, which is designed as an organization to “protect consumers from known and emerging threats,” has found such a vulnerability with 7zip.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Microsoft Google Backup Business Computing Software Windows 10 Smartphones Malware Business Hardware Ransomware Network Security Productivity Hosted Solutions Innovation Disaster Recovery Small Business Email Computer Android Business Continuity Alert Internet Efficiency Data VoIP User Tips Upgrade Windows Cybercrime Social Engineering Mobile Devices Data Backup Law Enforcement Smartphone Telephone Systems Miscellaneous Social Media Collaboration Virtualization Outsourced IT Office How To Network Communications Managed IT Services Operating System Quick Tips App Money Computers Chrome Browser Cybersecurity Managed IT Services Server Artificial Intelligence Automation Gadgets Communication Google Drive Office 365 Safety Bring Your Own Device Office Tips History Flexibility Router Mobile Device Management Remote Computing Spam Passwords Business Management Password Windows 10 Work/Life Balance Data Breach Data Recovery Health Wi-Fi Cloud Computing Microsoft Office End of Support Best Practice IT Services The Internet of Things HaaS Downtime Apps Facebook Unsupported Software Two-factor Authentication Marketing Saving Money Gmail Data Management Phishing Internet Exlporer Bandwidth Spam Blocking Private Cloud Data Storage Redundancy Workplace Tips Hacking Automobile Mobility Data storage Avoiding Downtime Productivity Black Market Public Cloud Government IT Management Physical Security Holiday Recovery Word OneNote Data Security Leadership IT Plan Amazon Web Services Shadow IT Computer Care Solid State Drive Voice over Internet Protocol Networking Data loss Windows Server 2008 Remote Work Mobile Device Music Settings Remote Monitoring Users PDF Managed IT Apple Encryption Sports HBO Business Intelligence Internet exploMicrosoft Employer-Employee Relationship Telephony Online Shopping NarrowBand Samsung Audit Current Events Screen Mirroring Windows 7 Identity Theft Video Games Wearable Technology Reputation Uninterrupted Power Supply Update Virtual Reality Files IT Support Risk Management Robot Information Technology Botnet Battery iPhone VPN Root Cause Analysis Outlook Millennials Content Advertising Software Tips Skype Evernote Wireless Technology Patch Management Relocation Value Computer Fan Multi-Factor Security Knowledge Cast Flash Credit Cards Scalability USB Customers Worker Commute Frequently Asked Questions Workforce Politics DDoS Netflix Travel Education Managed Service Provider Notifications Audiobook webinar BYOD Start Menu Search Scam Humor FENG Trending Network Congestion Fraud Cleaning Windows 10s Google Docs Laptop Excel BDR Keyboard IT Support Computing Infrastructure Save Money Meetings Entertainment Conferencing Tools How to Chromecast Lithium-ion battery Comparison Touchpad User Error IT Consultant Sync Amazon Instant Messaging Tech Support Vulnerability Website Tip of the week Telecommuting Legal Experience Monitor Wireless Applications Going Green YouTube Techology Internet of Things Hybrid Cloud Emails Specifications Books Worker Save Time Webinar Firewall Assessment CrashOverride Emergency Rootkit Hiring/Firing Employer Employee Relationship IT solutions Smart Technology Television Training WiFi Computer Accessories Two Factor Authentication Public Computer Compliance Loyalty Thank You Troubleshooting Vendor Management Bluetooth Regulation Transportation SaaS Congratulations Big Data Charger Electronic Medical Records Benefits

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.