GTSS Blog

GTS Solutions has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Thanks to one of Google’s researchers with the Zero Day Project, it has been discovered that LastPass has a major vulnerability as a result of a major architectural problem. This news comes on the heels of many other flaws the same researcher discovered within LastPass. However, based on what the researcher claims, these vulnerabilities were much less serious than his latest discovery.

0 Comments
Continue reading

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

In recent news, millions of records containing personal information were made available to the public in a sizable data leak, providing potential scammers with plenty of information to utilize in their schemes. These records were all part of a 53 GB database that was available for purchase from Dun & Bradstreet, a business service firm.

0 Comments
Continue reading

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for concern.

0 Comments
Continue reading

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Microsoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users that ignore these security patches are putting their system at unnecessary risk.

0 Comments
Continue reading

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

You don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan that has installed unwanted apps and malware to more than a million phones all over the world.

0 Comments
Continue reading

Alert: 7-Zip Software Can Leave Your System Vulnerable

Alert: 7-Zip Software Can Leave Your System Vulnerable

Software vulnerabilities can cause major issues for individuals and businesses. Cisco’s Talos Security Intelligence and Research Group, which is designed as an organization to “protect consumers from known and emerging threats,” has found such a vulnerability with 7zip.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Microsoft Backup Google Business Computing Software Windows 10 Smartphones Malware Business Hosted Solutions Productivity Ransomware Hardware Network Security Disaster Recovery Innovation Small Business Email Computer Android Business Continuity Alert User Tips Internet Efficiency Data VoIP Smartphone Telephone Systems Windows Cybercrime Upgrade Mobile Devices Social Engineering Data Backup Law Enforcement Social Media Browser Miscellaneous Office Collaboration Outsourced IT How To Virtualization Managed IT Services Quick Tips Communications Network Money Operating System Computers App Chrome Cybersecurity Managed IT Services Server Wi-Fi Data Recovery Artificial Intelligence Safety Communication Gadgets Office 365 Bring Your Own Device History Router Mobile Device Management Spam Flexibility Business Management Office Tips Remote Computing Windows 10 Health Password Data Breach Work/Life Balance Passwords Cloud Computing Automation Google Drive Holiday Data Security IT Services Downtime Word Microsoft Office Recovery Apps Best Practice Unsupported Software Marketing HaaS Facebook Two-factor Authentication Phishing Spam Blocking Private Cloud Saving Money Gmail Data Management Hacking Internet Exlporer Data Storage Data storage Bandwidth Black Market Public Cloud Automobile Government Workplace Tips Redundancy Productivity Physical Security Mobility IT Management Avoiding Downtime OneNote End of Support The Internet of Things Tip of the week Telecommuting Leadership IT Plan Techology Tech Support Computer Care Solid State Drive Specifications YouTube Networking Data loss PDF Settings Apple Internet exploMicrosoft Users Amazon Web Services NarrowBand Mobile Device Voice over Internet Protocol Music Samsung Audit Files Windows Server 2008 Remote Work Employer-Employee Relationship Reputation Remote Monitoring Shadow IT HBO Business Intelligence Current Events Screen Mirroring Robot Information Technology Managed IT iPhone Root Cause Analysis Advertising Telephony Virtual Reality Online Shopping Wireless Technology Relocation Video Games Wearable Technology Encryption Sports Value Computer Fan Windows 7 Battery Identity Theft Software Tips Customers IT Support Update Risk Management Managed Service Provider Outlook Millennials Patch Management Knowledge Cast Botnet Content Uninterrupted Power Supply Skype Worker Commute Evernote Netflix Humor Scalability Multi-Factor Security USB VPN FENG Laptop Flash Education Credit Cards webinar BYOD Politics Frequently Asked Questions Search Workforce Scam Network Congestion Travel Audiobook Windows 10s Meetings Start Menu DDoS IT Support Chromecast Trending Notifications Touchpad User Error Computing Infrastructure Fraud Conferencing Google Docs Keyboard Going Green Excel How to BDR IT Consultant Monitor Wireless Entertainment Cleaning Vulnerability Comparison Save Money Internet of Things Hybrid Cloud Tools Instant Messaging Sync Applications Amazon Emails Legal Website Experience Lithium-ion battery Congratulations Benefits Books Worker Assessment CrashOverride Save Time Webinar Firewall Emergency Rootkit Television Hiring/Firing Employer Employee Relationship IT solutions Smart Technology Training Public Computer Computer Accessories Loyalty Two Factor Authentication WiFi Vendor Management Compliance Bluetooth Troubleshooting SaaS Thank You Transportation Charger Big Data Regulation Electronic Medical Records

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.