GTSS Blog

GTS Solutions has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

0 Comments
Continue reading

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

0 Comments
Continue reading

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

The longer you use Facebook, the more personal content you hand over to the social media empire. Sharing content is what drives the social media experience, but what if you want your content back? Surprisingly, Facebook makes this easy.

0 Comments
Continue reading

Tip of the Week: How to Avoid Oversharing on Social Media

b2ap3_thumbnail_social_network_security_400.jpgSocial media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Microsoft Google Backup Business Computing Software Windows 10 Smartphones Malware Business Hardware Network Security Ransomware Productivity Hosted Solutions Innovation Small Business Disaster Recovery Email Computer Android Business Continuity Internet Efficiency Alert Data VoIP User Tips Smartphone Telephone Systems Law Enforcement Data Backup Upgrade Windows Social Engineering Cybercrime Mobile Devices Chrome Server Cybersecurity Managed IT Services Virtualization Social Media Miscellaneous Collaboration Network Office Outsourced IT Operating System Communications How To Managed IT Services Quick Tips App Money Browser Computers Work/Life Balance Windows 10 Gadgets Health Wi-Fi Data Recovery Data Breach Automation Artificial Intelligence Google Drive Communication Cloud Computing Safety Office 365 Office Tips Bring Your Own Device Remote Computing History Router Flexibility Mobile Device Management Passwords Spam Business Management Password Recovery Physical Security Best Practice IT Management Holiday End of Support Microsoft Office Data Security The Internet of Things IT Services Word OneNote Apps Downtime HaaS Saving Money Facebook Gmail Data Management Two-factor Authentication Internet Exlporer Marketing Unsupported Software Bandwidth Phishing Private Cloud Spam Blocking Automobile Hacking Workplace Tips Productivity Data storage Mobility Redundancy Avoiding Downtime Data Storage Black Market Public Cloud Government Meetings Touchpad User Error Comparison IT Support Instant Messaging Tools Applications Website Conferencing Monitor Shadow IT Wireless Legal Experience Sync Amazon Going Green IT Consultant Internet of Things Hybrid Cloud Techology Tip of the week Telecommuting Vulnerability Specifications Encryption Sports Users Voice over Internet Protocol Emails Mobile Device Music Amazon Web Services Remote Monitoring Leadership IT Plan Uninterrupted Power Supply PDF Windows Server 2008 Remote Work Computer Care Solid State Drive Apple Networking Data loss Internet exploMicrosoft HBO Business Intelligence Settings NarrowBand VPN Managed IT Files Virtual Reality Reputation Video Games Wearable Technology Telephony Online Shopping Battery Update Employer-Employee Relationship Robot Information Technology IT Support Risk Management Windows 7 Identity Theft Samsung Audit iPhone Patch Management Botnet Current Events Screen Mirroring DDoS Advertising Content Outlook Millennials Wireless Technology Notifications Relocation Worker Commute Multi-Factor Security Customers Scalability USB Skype Evernote Root Cause Analysis Education Software Tips Cleaning Politics Flash Credit Cards Value Computer Fan Managed Service Provider Search Scam Travel Knowledge Cast Audiobook Frequently Asked Questions Workforce Humor Save Money Laptop Trending Netflix Lithium-ion battery Start Menu Computing Infrastructure Google Docs webinar BYOD Tech Support Keyboard Fraud FENG How to Network Congestion Entertainment Excel BDR Windows 10s Chromecast YouTube Bluetooth Big Data Regulation Electronic Medical Records SaaS Benefits Charger Books Save Time Firewall Worker Emergency Hiring/Firing Webinar Assessment CrashOverride Smart Technology Rootkit Employer Employee Relationship IT solutions Television Two Factor Authentication WiFi Thank You Training Computer Accessories Troubleshooting Compliance Public Computer Loyalty Congratulations Transportation Vendor Management

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.