GTSS Blog

GTS Solutions has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

0 Comments
Continue reading

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

0 Comments
Continue reading

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

The longer you use Facebook, the more personal content you hand over to the social media empire. Sharing content is what drives the social media experience, but what if you want your content back? Surprisingly, Facebook makes this easy.

0 Comments
Continue reading

Tip of the Week: How to Avoid Oversharing on Social Media

b2ap3_thumbnail_social_network_security_400.jpgSocial media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Hackers Microsoft Backup Google Software Business Computing Windows 10 Smartphones Business Malware Hardware Network Security Ransomware Productivity Hosted Solutions Email Computer Android Business Continuity Innovation Small Business Disaster Recovery Data VoIP User Tips Internet Efficiency Alert Windows Social Engineering Cybercrime Mobile Devices Data Backup Smartphone Telephone Systems Law Enforcement Upgrade Communications Network Managed IT Services Operating System App Quick Tips Chrome Money Computers Browser Cybersecurity Managed IT Services Server Collaboration Social Media Outsourced IT Miscellaneous Virtualization How To Office Bring Your Own Device Spam Flexibility Office Tips History Remote Computing Mobile Device Management Router Windows 10 Password Passwords Work/Life Balance Business Management Data Recovery Data Breach Communication Cloud Computing Wi-Fi Artificial Intelligence Health Gadgets Google Drive Automation Office 365 Safety Saving Money Phishing Gmail Marketing Data Management Internet Exlporer Spam Blocking Bandwidth Redundancy Automobile Avoiding Downtime Data Storage Workplace Tips Mobility Private Cloud Productivity Hacking IT Management Data storage Government Word Black Market Data Security Public Cloud Physical Security OneNote Holiday Microsoft Office Recovery IT Services Best Practice The Internet of Things HaaS End of Support Two-factor Authentication Apps Facebook Unsupported Software Downtime Computer Fan Content Files Software Tips Patch Management VPN Reputation Flash Credit Cards Value Worker Commute iPhone Travel Knowledge Cast Scalability USB Robot Frequently Asked Questions Information Technology Workforce Wireless Technology Relocation Start Menu Politics Advertising Trending Netflix Education Fraud FENG Audiobook DDoS Google Docs webinar BYOD Search Scam Notifications Customers Managed Service Provider Network Congestion Excel BDR Windows 10s Humor Tools Meetings Keyboard Cleaning Comparison IT Support Computing Infrastructure Sync Amazon Entertainment Laptop Website Conferencing How to Save Money IT Consultant Instant Messaging Lithium-ion battery Tip of the week Telecommuting Vulnerability Chromecast Legal Experience Tech Support Specifications Applications Amazon Web Services Techology Touchpad User Error Voice over Internet Protocol Emails YouTube Going Green Remote Monitoring Leadership IT Plan Monitor Windows Server 2008 Wireless Remote Work Computer Care Solid State Drive Managed IT Networking Data loss Mobile Device Music Shadow IT Internet of Things HBO Hybrid Cloud Business Intelligence Settings Users Telephony Online Shopping Update Employer-Employee Relationship Encryption Sports Windows 7 Identity Theft Samsung Audit Apple Botnet Current Events Screen Mirroring Video Games Wearable Technology Outlook PDF Millennials Virtual Reality NarrowBand Skype Evernote Root Cause Analysis IT Support Risk Management Uninterrupted Power Supply Internet exploMicrosoft Multi-Factor Security Battery WiFi Training Compliance Public Computer Computer Accessories Two Factor Authentication Loyalty Troubleshooting Vendor Management Thank You Regulation Bluetooth SaaS Transportation Big Data Charger Congratulations Electronic Medical Records Benefits Books Worker Save Time Assessment CrashOverride Webinar Firewall Emergency Rootkit Hiring/Firing Television Employer Employee Relationship IT solutions Smart Technology

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.