Blog

Keep New Hires Safe from Cyber Threats

Keep New Hires Safe from Cyber Threats

Cyber threats are becoming increasingly sophisticated, targeting even the most unsuspecting individuals. From day one, it is crucial to protect employees and ensure they are equipped to recognize and respond to potential threats.

RingCentral case study

RingCentral case study

When the TBA faced the urgent need to adapt to a rapidly changing work environment, they turned to GCS Technologies…

What is MFA Bombing?

What is MFA Bombing?

Multi-factor authentication (MFA) is a security technique that requires users to provide multiple forms of authentication when accessing a system or service. This means that in addition to a username and password, users must provide an additional piece of information,...

What to do after your managed service provider has been acquired

What to do after your managed service provider has been acquired

Many of Austin's largest managed service providers have been acquired.… Client satisfaction and continuity are rarely a consideration in these liquidation events. Over the past several years, GCS competitors have been acquired at a brisk pace. The race to roll up IT...

How Tax Preparers Can Achieve Compliance with IRS Publication 4557

How Tax Preparers Can Achieve Compliance with IRS Publication 4557

Cybersecurity is serious business, especially when it comes to compliance. Threat actors know this, smart organisations know this, and regulators know this. In the past, organisations could get away with weak cybersecurity controls because attackers were few and...

6 malware techniques commonly used in PHISHing attacks

6 malware techniques commonly used in PHISHing attacks

Phishing is a technique commonly used in malware attacks. In a phishing attack, the attacker sends an email that appears to be from a trusted source, such as a friend or company. The email contains a link or attachment that will install malware on the victim's...

IT Security in SMBs

IT Security in SMBs

This article was co-authored by Mike Wilfley, vcfo Chief Operating Officer and Executive Vice President, and Shane Gronniger, CEO for GCS Technologies. Ensuring IT Security in Small- to Medium-Sized Businesses A decade ago, dealing with spam, avoiding worms...

Businesses Need Greater Transparency

Businesses Need Greater Transparency

As businesses begin to resume normal operations after a couple of years of disruption, two main issues remain: enabling staff for hybrid work environments and gaining visibility over (and justification for) everything in their budget. A barrage of questions ensue --...

4 tips for maintaining remote work productivity

4 tips for maintaining remote work productivity

According to a recent analysis by FlexJobs and Global Workplace Analytics, maintaining remote work productivity has become a significant concern for companies long before COVID ever became an issue. There was already an upward trend in the number of people working...

Top 5 Things to Consider for Remote Work Security

Top 5 Things to Consider for Remote Work Security

When employees transition from working in the closely-guarded walls of an office to the wild unknown of remote locations, companies have to come up with an entirely new security game plan to ensure they mitigate any and all risks and attacks related to remote work...

Pin It on Pinterest