GTSS Blog

GTS Solutions has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

0 Comments
Continue reading

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Banks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft--by no less than the Secret Service.

0 Comments
Continue reading

According to FBI Director, Privacy is a Misnomer

According to FBI Director, Privacy is a Misnomer

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

0 Comments
Continue reading

A Law From 1986 Shouldn’t Govern Email Privacy in 2016

b2ap3_thumbnail_congress_to_hear_arguments_for_ecpa_reform_400.jpgAre you familiar with the protections in place that ensure that your digital communications remain private? What’s keeping an entity like the government from going through your emails? In the United States, the government uses a loophole in an outdated law to access the digital information they want from its citizens. If you’re concerned about privacy, you need to be informed about such laws and loopholes.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Privacy Best Practices Technology Cloud Hackers Microsoft Backup Google Software Business Computing Windows 10 Smartphones Business Malware Ransomware Hosted Solutions Productivity Hardware Network Security Business Continuity Innovation Small Business Disaster Recovery Android Email Computer VoIP User Tips Internet Efficiency Alert Data Mobile Devices Smartphone Telephone Systems Law Enforcement Upgrade Data Backup Windows Social Engineering Cybercrime Quick Tips Collaboration Outsourced IT Money Browser Computers Managed IT Services Communications Chrome App Server Virtualization Social Media Cybersecurity Managed IT Services Miscellaneous Network Operating System Office How To Router Passwords Mobile Device Management Office 365 Data Recovery Spam Business Management Communication Gadgets Flexibility Health Windows 10 Automation Google Drive Data Breach Cloud Computing Password Safety Work/Life Balance Office Tips Wi-Fi Remote Computing Bring Your Own Device Artificial Intelligence History Apps Avoiding Downtime HaaS Private Cloud Facebook Phishing Spam Blocking Hacking Data storage Word Black Market Public Cloud Recovery Data Security Government Best Practice Physical Security Data Storage End of Support Automobile The Internet of Things Two-factor Authentication IT Management Workplace Tips Productivity Mobility Gmail Downtime OneNote Saving Money Internet Exlporer Data Management Marketing Bandwidth Holiday IT Services Microsoft Office Unsupported Software Redundancy Save Money Root Cause Analysis Excel BDR Managed Service Provider Software Tips Lithium-ion battery Tools Value Computer Fan Comparison Humor Sync Laptop Amazon Virtual Reality Website Knowledge Cast Video Games Wearable Technology Tech Support Netflix Battery YouTube IT Support Risk Management Tip of the week Telecommuting webinar BYOD Patch Management FENG Content Chromecast Specifications Touchpad Amazon Web Services User Error Windows 10s Worker Commute Voice over Internet Protocol Network Congestion Scalability USB Shadow IT IT Support Education Remote Monitoring Monitor Wireless Meetings Politics Windows Server 2008 Going Green Remote Work Conferencing Search Encryption Scam Sports Managed IT Internet of Things Hybrid Cloud Audiobook HBO Business Intelligence Telephony Online Shopping Vulnerability IT Consultant Computing Infrastructure Update Keyboard Uninterrupted Power Supply Windows 7 Identity Theft Emails How to VPN Botnet PDF Entertainment Outlook Millennials Apple Instant Messaging Skype Evernote Internet exploMicrosoft Computer Care Solid State Drive NarrowBand Multi-Factor Security Leadership IT Plan Flash Credit Cards Files Settings Applications Reputation Networking Data loss Legal Experience Notifications Travel Robot Information Technology Techology DDoS Frequently Asked Questions Workforce iPhone Start Menu Advertising Samsung Audit Wireless Technology Trending Relocation Employer-Employee Relationship Fraud Users Google Docs Customers Current Events Screen Mirroring Mobile Device Music Cleaning Employer Employee Relationship IT solutions Firewall Television Emergency Regulation Training Congratulations Hiring/Firing Computer Accessories Smart Technology Public Computer Loyalty Vendor Management Bluetooth Two Factor Authentication SaaS Troubleshooting Charger Transportation Big Data Worker Electronic Medical Records WiFi Webinar Benefits Assessment CrashOverride Books Compliance Rootkit Thank You Save Time

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.