Blog

Microsoft September 2024 Updates

Microsoft September 2024 Updates

Explore new Microsoft updates boosting security and streamlining workflows with features like location-based presence and stronger passcodes.

Keep New Hires Safe from Cyber Threats

Keep New Hires Safe from Cyber Threats

Cyber threats are becoming increasingly sophisticated, targeting even the most unsuspecting individuals. From day one, it is crucial to protect employees and ensure they are equipped to recognize and respond to potential threats.

RingCentral case study

RingCentral case study

When the TBA faced the urgent need to adapt to a rapidly changing work environment, they turned to GCS Technologies…

What is MFA Bombing?

What is MFA Bombing?

Multi-factor authentication (MFA) is a security technique that requires users to provide multiple forms of authentication when accessing a system or service. This means that in addition to a username and password, users must provide an additional piece of information,...

What to do after your managed service provider has been acquired

What to do after your managed service provider has been acquired

Many of Austin's largest managed service providers have been acquired.… Client satisfaction and continuity are rarely a consideration in these liquidation events. Over the past several years, GCS competitors have been acquired at a brisk pace. The race to roll up IT...

How Tax Preparers Can Achieve Compliance with IRS Publication 4557

How Tax Preparers Can Achieve Compliance with IRS Publication 4557

Cybersecurity is serious business, especially when it comes to compliance. Threat actors know this, smart organisations know this, and regulators know this. In the past, organisations could get away with weak cybersecurity controls because attackers were few and...

6 malware techniques commonly used in PHISHing attacks

6 malware techniques commonly used in PHISHing attacks

Phishing is a technique commonly used in malware attacks. In a phishing attack, the attacker sends an email that appears to be from a trusted source, such as a friend or company. The email contains a link or attachment that will install malware on the victim's...

IT Security in SMBs

IT Security in SMBs

This article was co-authored by Mike Wilfley, vcfo Chief Operating Officer and Executive Vice President, and Shane Gronniger, CEO for GCS Technologies. Ensuring IT Security in Small- to Medium-Sized Businesses A decade ago, dealing with spam, avoiding worms...

Businesses Need Greater Transparency

Businesses Need Greater Transparency

As businesses begin to resume normal operations after a couple of years of disruption, two main issues remain: enabling staff for hybrid work environments and gaining visibility over (and justification for) everything in their budget. A barrage of questions ensue --...

Pin It on Pinterest