GTSS Blog

GTS Solutions has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

0 Comments
Continue reading

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

0 Comments
Continue reading

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

The longer you use Facebook, the more personal content you hand over to the social media empire. Sharing content is what drives the social media experience, but what if you want your content back? Surprisingly, Facebook makes this easy.

0 Comments
Continue reading

Tip of the Week: How to Avoid Oversharing on Social Media

b2ap3_thumbnail_social_network_security_400.jpgSocial media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Microsoft Google Backup Business Computing Software Windows 10 Smartphones Malware Business Hardware Ransomware Network Security Hosted Solutions Productivity Disaster Recovery Innovation Small Business Email Computer Android Business Continuity Alert Internet Efficiency Data VoIP User Tips Telephone Systems Smartphone Windows Upgrade Cybercrime Social Engineering Data Backup Mobile Devices Law Enforcement Social Media Miscellaneous Communications Managed IT Services Office Virtualization App Chrome Network Operating System Cybersecurity Managed IT Services Quick Tips Money Computers How To Collaboration Browser Server Outsourced IT Google Drive Automation Gadgets Data Recovery Spam Safety Flexibility Communication Bring Your Own Device Windows 10 History Password Mobile Device Management Data Breach Office Tips Router Work/Life Balance Remote Computing Cloud Computing Business Management Wi-Fi Artificial Intelligence Passwords Health Office 365 The Internet of Things Recovery End of Support Phishing Spam Blocking Best Practice Downtime Data Security Word Data Storage Marketing Automobile Gmail Workplace Tips Saving Money Two-factor Authentication Mobility Data Management IT Management Productivity Internet Exlporer Bandwidth OneNote Private Cloud Hacking Holiday Data storage Microsoft Office Government IT Services Black Market Public Cloud Physical Security Unsupported Software HaaS Redundancy Apps Avoiding Downtime Facebook Value Computer Fan Comparison Video Games Wearable Technology Software Tips Tools Virtual Reality Website IT Support Risk Management Knowledge Cast Sync Amazon Battery Shadow IT Content Apple Tip of the week Telecommuting Patch Management PDF Netflix Encryption Sports NarrowBand FENG Specifications Scalability USB Internet exploMicrosoft webinar BYOD Worker Commute Windows 10s Voice over Internet Protocol Politics Files Network Congestion Amazon Web Services Education Reputation Remote Monitoring Audiobook iPhone Meetings Windows Server 2008 Remote Work Search Scam Uninterrupted Power Supply Robot Information Technology IT Support VPN Wireless Technology Relocation HBO Business Intelligence Advertising Conferencing Managed IT Vulnerability Keyboard IT Consultant Telephony Online Shopping Computing Infrastructure Customers Update Entertainment Managed Service Provider Windows 7 Identity Theft How to Botnet Notifications Humor Outlook Millennials Instant Messaging DDoS Emails Computer Care Solid State Drive Multi-Factor Security Legal Experience Laptop Leadership IT Plan Skype Evernote Applications Settings Techology Networking Data loss Flash Credit Cards Cleaning Travel Save Money Chromecast Frequently Asked Questions Workforce Samsung Audit Trending Mobile Device Music Touchpad User Error Employer-Employee Relationship Start Menu Users Lithium-ion battery Google Docs Going Green Current Events Screen Mirroring Fraud Tech Support Monitor Wireless YouTube Root Cause Analysis Excel BDR Internet of Things Hybrid Cloud Regulation Hiring/Firing Training Smart Technology Public Computer Computer Accessories Loyalty Vendor Management Two Factor Authentication Bluetooth SaaS Troubleshooting Charger Transportation Big Data Electronic Medical Records Worker WiFi Thank You Benefits Assessment CrashOverride Books Webinar Compliance Save Time Rootkit Congratulations Firewall Television Emergency Employer Employee Relationship IT solutions

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.