GTSS Blog

GTS Solutions has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

0 Comments
Continue reading

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Banks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft--by no less than the Secret Service.

0 Comments
Continue reading

According to FBI Director, Privacy is a Misnomer

According to FBI Director, Privacy is a Misnomer

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

0 Comments
Continue reading

A Law From 1986 Shouldn’t Govern Email Privacy in 2016

b2ap3_thumbnail_congress_to_hear_arguments_for_ecpa_reform_400.jpgAre you familiar with the protections in place that ensure that your digital communications remain private? What’s keeping an entity like the government from going through your emails? In the United States, the government uses a loophole in an outdated law to access the digital information they want from its citizens. If you’re concerned about privacy, you need to be informed about such laws and loopholes.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Microsoft Google Backup Software Business Computing Windows 10 Smartphones Malware Business Ransomware Hardware Network Security Productivity Hosted Solutions Innovation Small Business Email Computer Android Business Continuity Disaster Recovery Internet Efficiency Data VoIP Alert User Tips Smartphone Telephone Systems Windows Cybercrime Upgrade Mobile Devices Social Engineering Data Backup Law Enforcement Office Collaboration Outsourced IT Virtualization Communications Quick Tips Managed IT Services Network Chrome Operating System Money App Computers Cybersecurity Managed IT Services Server Miscellaneous Social Media Browser How To Safety Gadgets Office 365 Bring Your Own Device Spam History Router Mobile Device Management Windows 10 Flexibility Office Tips Business Management Data Breach Remote Computing Cloud Computing Password Health Work/Life Balance Passwords Data Recovery Automation Google Drive Communication Wi-Fi Artificial Intelligence Recovery Two-factor Authentication HaaS Marketing Phishing Apps Best Practice Spam Blocking Facebook Data Storage Private Cloud Saving Money Gmail Data Management Hacking Internet Exlporer Data storage Bandwidth Redundancy IT Management Automobile Black Market Public Cloud Workplace Tips Government Avoiding Downtime Productivity OneNote Mobility Physical Security End of Support Data Security The Internet of Things Word Holiday Unsupported Software Microsoft Office Downtime IT Services Users Internet exploMicrosoft HBO Business Intelligence Root Cause Analysis Mobile Device NarrowBand Music Managed IT Value Computer Fan Reputation Shadow IT Telephony Online Shopping Software Tips Files Robot Information Technology Windows 7 Identity Theft Knowledge Cast iPhone Update Netflix Virtual Reality Advertising Outlook Millennials Video Games Wireless Technology Wearable Technology Relocation Encryption Sports Botnet Multi-Factor Security FENG IT Support Risk Management Customers Skype Evernote webinar BYOD Battery Windows 10s Content Uninterrupted Power Supply Flash Credit Cards Network Congestion Patch Management Managed Service Provider IT Support Worker Commute Frequently Asked Questions Workforce Meetings Scalability USB Humor VPN Travel Trending Politics Start Menu Conferencing Education Laptop Google Docs Vulnerability Audiobook Fraud IT Consultant Search Scam DDoS Excel BDR Chromecast Notifications Touchpad User Error Comparison Keyboard Tools Emails Computing Infrastructure Website Computer Care Solid State Drive Entertainment Monitor Wireless Cleaning Sync Amazon Leadership IT Plan How to Going Green Settings Internet of Things Hybrid Cloud Tip of the week Telecommuting Networking Data loss Instant Messaging Save Money Applications Specifications Legal Experience Lithium-ion battery Voice over Internet Protocol Samsung Audit Techology Tech Support Amazon Web Services Employer-Employee Relationship PDF Windows Server 2008 Remote Work Current Events Screen Mirroring Apple YouTube Remote Monitoring Save Time Television Employer Employee Relationship IT solutions Firewall Training Emergency Hiring/Firing Public Computer Computer Accessories Loyalty Smart Technology Vendor Management WiFi Bluetooth SaaS Compliance Two Factor Authentication Charger Troubleshooting Regulation Transportation Thank You Worker Big Data Electronic Medical Records Assessment CrashOverride Webinar Benefits Congratulations Rootkit Books

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.