Many of Austin’s largest managed service providers have been acquired.… Client satisfaction and continuity are rarely a consideration in these liquidation events. Over the past several years, GCS competitors have been acquired at a brisk pace. The race to roll...
As a certified Microsoft partner, GCS provides its customers with not only licensing but also extensive professional services related to the Microsoft portfolio, specifically in the realm of IT security networks. This is because we share Microsoft’s commitment...
In August, ConnectWise released its annual State of SMB IT Cybersecurity report. One of its more notable findings is that small and medium businesses (SMBs) have reached a cybersecurity “tipping point”. In other words, SMBs no longer think of IT cybersecurity as a...
Phishing is a technique commonly used in malware attacks. In a phishing attack, the attacker sends an email that appears to be from a trusted source, such as a friend or company. The email contains a link or attachment that will install malware on the victim’s...
This article was co-authored by Mike Wilfley, vcfo Chief Operating Officer and Executive Vice President, and Shane Gronniger, CEO for GCS Technologies. Ensuring IT Security in Small- to Medium-Sized Businesses A decade ago, dealing with spam, avoiding worms...
When employees transition from working in the closely-guarded walls of an office to the wild unknown of remote locations, companies have to come up with an entirely new security game plan to ensure they mitigate any and all risks and attacks related to remote work...