Blog

What to do after your MSP provider has been acquired

What to do after your MSP provider has been acquired

Many of Austin's largest managed service providers have been acquired.… Client satisfaction and continuity are rarely a consideration in these liquidation events. Over the past several years, GCS competitors have been acquired at a brisk pace. The race to roll up IT...

MSPs are Ideal for SMB Cybersecurity

MSPs are Ideal for SMB Cybersecurity

In August, ConnectWise released its annual State of SMB Cybersecurity report. One of its more notable findings is that small and medium businesses (SMBs) have reached a cybersecurity “tipping point”. In other words, SMBs no longer think of cybersecurity as a secondary...

How Tax Preparers Can Achieve Compliance with IRS Publication 4557

How Tax Preparers Can Achieve Compliance with IRS Publication 4557

Cybersecurity is serious business. Threat actors know this. Smart organizations know this. And regulators know this. In the past, organizations got away with weak cybersecurity controls because attackers were few and attacks were rare. But those days are long gone. In...

6 malware techniques commonly used in PHISHing attacks

6 malware techniques commonly used in PHISHing attacks

Phishing is a technique commonly used in malware attacks. In a phishing attack, the attacker sends an email that appears to be from a trusted source, such as a friend or company. The email contains a link or attachment that will...

IT Security in SMBs

IT Security in SMBs

This article was co-authored by Mike Wilfley, vcfo Chief Operating Officer and Executive Vice President, and Shane Gronniger, CEO for GCS Technologies. Ensuring IT Security in Small- to Medium-Sized Businesses A decade ago, dealing with spam, avoiding worms...

Businesses Need Greater Transparency

Businesses Need Greater Transparency

As businesses begin to resume normal operations after a couple years of disruption, two main issues remain: enabling staff for hybrid work environments and gaining visibility over (and justification for) everything in their budget. A barrage of questions ensue -- How...

4 tips for maintaining remote work productivity

4 tips for maintaining remote work productivity

According to a recent analysis by FlexJobs and Global Workplace Analytics, long before COVID ever became an issue, there was already an upward trend in the number of people working remotely in the U.S. Specifically, over the last five years, remote work has...

Top 5 Things to Consider for Remote Security

Top 5 Things to Consider for Remote Security

When employees transition from working in the closely-guarded walls of an office to the wild unknown of remote locations, companies have to come up with an entirely new security game plan to ensure they mitigate any and all risks and attacks. To make this process less...

Pin It on Pinterest