Blog
The Risks and Mitigation Strategies for New Top-Level Domains
With the recent introduction of new top-level domains (TLDs) by Google, users now face potential risks that can lead to phishing attacks.
The Ultimate Guide to Microsoft Secure Score
Safeguard your organization from cyber threats by understanding and improving your security posture with Microsoft Secure Score.
Why Buying More Bandwidth Might Not Solve Your Office Internet Issues
Many businesses mistakenly think that they can solve their office internet issues by adding more bandwidth. However, office environments are far more complex than residential ones, and purchasing a bigger internet connection may not always be the solution. In this...
Large Ransomware Attack on Rackspace Hosted Exchange: Time to Move to Microsoft 365?
Rackspace is a U.S-based cloud computing service provider with customers in 120+ countries. On December 2nd 2022, many Rackspace customers began experiencing problems logging into and accessing their email accounts held in their Rackspace Hosted Microsoft Exchange...
What is MFA Bombing?
Multi-factor authentication (MFA) is a security technique that requires users to provide multiple forms of authentication when accessing a system or service. This means that in addition to a username and password, users must provide an additional piece of information,...
When Should You Switch IT Service Providers? Watch Out for these 3 Signs!
Every business requires some level of IT service providers to help manage cybersecurity, data backups, disaster recovery, cloud migration, and even help desk support. To maintain these services, there are two options: 1) create and maintain an in-house team 2) work...
What to do after your MSP provider has been acquired
Many of Austin's largest managed service providers have been acquired.… Client satisfaction and continuity are rarely a consideration in these liquidation events. Over the past several years, GCS competitors have been acquired at a brisk pace. The race to roll up IT...
Forrester Wave reports have recognized Microsoft’s commitment to continuous improvement
As a certified Microsoft partner, GCS provides its customers with not only licensing but also extensive professional services related to the Microsoft portfolio. This is because we share Microsoft's commitment to innovation and security, which aligns with our focus on...
MSPs are Ideal for SMB Cybersecurity
In August, ConnectWise released its annual State of SMB Cybersecurity report. One of its more notable findings is that small and medium businesses (SMBs) have reached a cybersecurity “tipping point”. In other words, SMBs no longer think of cybersecurity as a secondary...
How Tax Preparers Can Achieve Compliance with IRS Publication 4557
Cybersecurity is serious business. Threat actors know this. Smart organizations know this. And regulators know this. In the past, organizations got away with weak cybersecurity controls because attackers were few and attacks were rare. But those days are long gone. In...