GTSS Blog

GTS Solutions has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

0 Comments
Continue reading

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

0 Comments
Continue reading

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

The longer you use Facebook, the more personal content you hand over to the social media empire. Sharing content is what drives the social media experience, but what if you want your content back? Surprisingly, Facebook makes this easy.

0 Comments
Continue reading

Tip of the Week: How to Avoid Oversharing on Social Media

b2ap3_thumbnail_social_network_security_400.jpgSocial media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Privacy Best Practices Technology Cloud Hackers Microsoft Backup Google Software Business Computing Windows 10 Smartphones Malware Business Productivity Hosted Solutions Ransomware Hardware Network Security Disaster Recovery Business Continuity Innovation Small Business Android Email Computer VoIP User Tips Internet Efficiency Data Alert Windows Smartphone Telephone Systems Cybercrime Upgrade Mobile Devices Data Backup Social Engineering Law Enforcement Office Browser Chrome Quick Tips Cybersecurity Managed IT Services Virtualization Collaboration Money Computers Outsourced IT Network Operating System Communications Managed IT Services How To Server Miscellaneous App Social Media Spam Safety Password Work/Life Balance Bring Your Own Device Gadgets Windows 10 History Wi-Fi Artificial Intelligence Mobile Device Management Router Data Breach Cloud Computing Office 365 Business Management Office Tips Data Recovery Remote Computing Health Google Drive Flexibility Automation Communication Passwords Automobile Spam Blocking Workplace Tips Downtime Two-factor Authentication Mobility Productivity Marketing Data Storage Recovery Best Practice Holiday Microsoft Office IT Services IT Management Private Cloud Hacking HaaS OneNote Redundancy Apps Avoiding Downtime Facebook Gmail Saving Money Data storage Internet Exlporer Government Data Management Black Market Public Cloud Bandwidth Physical Security Unsupported Software Data Security Word The Internet of Things End of Support Phishing Lithium-ion battery Apple HBO Business Intelligence Knowledge Cast PDF Managed IT Netflix NarrowBand Tech Support Keyboard Internet exploMicrosoft Telephony Online Shopping Computing Infrastructure Reputation Update Entertainment FENG YouTube Files Windows 7 Identity Theft How to webinar BYOD Windows 10s iPhone Outlook Millennials Instant Messaging Network Congestion Robot Information Technology Botnet IT Support Wireless Technology Shadow IT Relocation Multi-Factor Security Legal Experience Meetings Advertising Skype Evernote Applications Conferencing Customers Techology Flash Credit Cards Vulnerability Encryption Sports Managed Service Provider Frequently Asked Questions Workforce IT Consultant Travel Humor Trending Mobile Device Music Start Menu Users Emails Uninterrupted Power Supply Google Docs Laptop Fraud Computer Care Solid State Drive VPN Excel BDR Leadership IT Plan Virtual Reality Settings Chromecast Comparison Video Games Wearable Technology Networking Data loss Tools Website IT Support Risk Management Touchpad User Error Sync Amazon Battery Wireless Content Samsung Audit Notifications Going Green Tip of the week Telecommuting Patch Management Employer-Employee Relationship DDoS Monitor Worker Commute Specifications Scalability USB Current Events Screen Mirroring Internet of Things Hybrid Cloud Cleaning Voice over Internet Protocol Politics Root Cause Analysis Amazon Web Services Education Remote Monitoring Audiobook Value Computer Fan Save Money Windows Server 2008 Remote Work Search Scam Software Tips Training Troubleshooting Computer Accessories Public Computer Congratulations Loyalty Transportation Vendor Management Big Data Bluetooth Electronic Medical Records WiFi SaaS Benefits Charger Books Compliance Save Time Firewall Emergency Hiring/Firing Worker Regulation Webinar Assessment CrashOverride Smart Technology Rootkit Employer Employee Relationship IT solutions Television Thank You Two Factor Authentication

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.