GTSS Blog

GTS Solutions has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

0 Comments
Continue reading

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Banks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft--by no less than the Secret Service.

0 Comments
Continue reading

According to FBI Director, Privacy is a Misnomer

According to FBI Director, Privacy is a Misnomer

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

0 Comments
Continue reading

A Law From 1986 Shouldn’t Govern Email Privacy in 2016

b2ap3_thumbnail_congress_to_hear_arguments_for_ecpa_reform_400.jpgAre you familiar with the protections in place that ensure that your digital communications remain private? What’s keeping an entity like the government from going through your emails? In the United States, the government uses a loophole in an outdated law to access the digital information they want from its citizens. If you’re concerned about privacy, you need to be informed about such laws and loopholes.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Microsoft Backup Google Software Business Computing Windows 10 Smartphones Malware Business Hosted Solutions Productivity Hardware Network Security Ransomware Innovation Small Business Disaster Recovery Android Email Computer Business Continuity User Tips Internet Efficiency Alert Data VoIP Data Backup Smartphone Telephone Systems Law Enforcement Upgrade Social Engineering Windows Cybercrime Mobile Devices Cybersecurity Managed IT Services Browser Money App Computers Server How To Virtualization Miscellaneous Social Media Network Operating System Office Collaboration Outsourced IT Managed IT Services Chrome Communications Quick Tips Data Breach Business Management Cloud Computing Data Recovery Communication Gadgets Password Health Work/Life Balance Google Drive Wi-Fi Automation Artificial Intelligence Safety Spam Office 365 Office Tips Remote Computing Bring Your Own Device History Router Mobile Device Management Windows 10 Passwords Flexibility Hacking Data storage Workplace Tips OneNote Automobile Data Security Government Productivity Word Recovery Black Market Public Cloud Mobility Physical Security Best Practice Unsupported Software The Internet of Things End of Support Holiday Two-factor Authentication IT Services Microsoft Office Gmail Saving Money Downtime Phishing Internet Exlporer Spam Blocking Apps Data Management HaaS Marketing Facebook Bandwidth Data Storage Redundancy Avoiding Downtime Private Cloud IT Management Search Scam Sync Amazon Laptop Audiobook Website Tech Support Emails Tip of the week Telecommuting YouTube Specifications Chromecast Computer Care Solid State Drive Computing Infrastructure Leadership IT Plan Keyboard Shadow IT Settings How to Amazon Web Services Touchpad Networking User Error Data loss Entertainment Voice over Internet Protocol Monitor Wireless Instant Messaging Windows Server 2008 Remote Work Going Green Remote Monitoring Experience HBO Business Intelligence Encryption Sports Samsung Audit Applications Managed IT Internet of Things Employer-Employee Relationship Hybrid Cloud Legal Telephony Online Shopping Current Events Screen Mirroring Techology Windows 7 Identity Theft Root Cause Analysis Update Uninterrupted Power Supply Mobile Device Music Outlook Millennials VPN Value Apple Computer Fan Users Botnet PDF Software Tips Multi-Factor Security NarrowBand Skype Evernote Knowledge Internet exploMicrosoft Cast Reputation Netflix Flash Credit Cards Files Video Games Wearable Technology Frequently Asked Questions Workforce Notifications iPhone FENG Virtual Reality Travel DDoS Robot webinar Information Technology BYOD Trending Wireless Technology Relocation Windows 10s Battery Start Menu Network Congestion Advertising IT Support Risk Management Customers IT Support Patch Management Fraud Meetings Content Google Docs Cleaning Conferencing Scalability USB Excel BDR Save Money Managed Service Provider Worker Commute Comparison Lithium-ion battery Humor Vulnerability Education Tools IT Consultant Politics Congratulations Troubleshooting Worker Transportation Webinar Big Data Assessment CrashOverride Electronic Medical Records Rootkit Benefits Employer Employee Relationship IT solutions Books Television Save Time Training Firewall Computer Accessories Emergency Public Computer WiFi Loyalty Hiring/Firing Vendor Management Smart Technology Compliance Bluetooth Thank You SaaS Charger Two Factor Authentication Regulation

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.