November 8, 2017

Krack WPA2 Attack Update & Video Resource

Comments are off
Below is an article and link to a very informative video from our technology partner - WatchGuard. Article and Video by WatchGuard Chief Technology Officer, Corey Nachreiner. Video Link: In the early 2000s, you probably remember when researchers discovered some vulnerabilities that put the nail in the coffin of Wired Equivalent Privacy (WEP), a security protocol used to protect Wi-Fi communications. Essentially, this WEP vulnerability meant that attackers could quickly crack WEP encryption, and see all your wireless traffic. At the time, this flaw caused a major uproar, and forced the industry to design a new Wi-Fi security protocol, Wi-Fi Protected Access (WPA). Unfortunately, a Belgian researcher has found a number of vulnerabilities in WPA2’s 4-way handshake. Like the WEP issue, these flaws could allow wireless hackers to decrypt your employees’ Wi-Fi communications. The good news is, unlike the WEP vulnerability, you can patch these WPA2 problems. Watch today’s Daily Byte video to learn a bit more about the Krack WPA2 attacks, and what you can do about them.
November 7, 2017

7 Cyber-Crime Prevention Best Practices

Comments are off
Cyber-criminals continue to flood cyberspace with viruses, malware, DDoS, trojans, spear-phishing, and social engineering attacks. Attacks like Locky, Mamba, WannaCry, Petya and IoT Reaper, to name a few, have infected millions of computers costing individuals and businesses-of-all-sizes approximately $400B across the globe. The reality is clear, criminals are constantly at work and their new mutations are increasingly dangerous. So, if you're lucky enough to be among the few who have been uninfected - congratulations! However, your network could be infected right now and you don't know it. In fact, computer forensics have found that most hackers gain access to networks weeks, sometimes months, before they execute their full assault. For companies that want to remain virus and malware-free, the process involves commitment and diligence. When it comes to securing your computer and wireless networks - the old adage is true - an ounce of prevention is worth a pound of cure. That's why we want to share these best practices: 1. Increase Employee Awareness This is one of the most cost-effective methods of preventing a cyber attack. Today, only 58 percent of U.S. mid-size companies train employees on cyber-security. It is critical to understand that cyber attacks can occur just
November 2, 2017

GBS Cyber-Security Forum

Comments are off
Join GBS CyberSecurity expert, Chris Van Dyke, at the Northern Kentucky Chamber of Commerce on Nov. 14, 2017 at 11:30 - 12:30. This presentation dives deep into the cyber-security landscape, addresses how to combat threats and the best technologies to prevent, detect and resolve breaches. Registration required at
, , , ,
Gaby Batshoun, GBS President
GBS is proud to announce that Gaby Batshoun, President was honored today as one of Cincinnati’s top entrepreneurs. Gaby was selected as an honoree for the 2017 John F. Barrett Entrepreneur Vision Award. This annual honor recognizes local business leaders whose vision, passion and willingness to take risks makes a direct impact on their business, its stakeholders and contributes to the overall good of Greater Cincinnati. Every day, Gaby’s uses his never-ending entrepreneurial, innovative spirit to develop technology-based solutions for our clients - giving them a competitive edge.
October 17, 2017

Wi-Fi Security Flaw & the GBS Solution

Comments are off
THE VULNERABILITY - Explained US warns of security flaw which can compromise Wi-Fi connections The US government's computer security watchdog warned Monday of a security flaw in Wi-Fi encryption protocol which can open the door to attacks to eavesdrop on or hijack devices using wireless networks.The disclosure by the government's Computer Emergency Response Team could potentially allow hackers to snoop on or take over millions of devices which use Wi-Fi. The agency, part of the Department of Homeland Security, said the flaw was discovered by researchers at the Belgian university KU Leuven. According to the news site Ars Technica, the discovery was a closely guarded secret for weeks to allow Wi-Fi systems to develop security patches. Attackers can exploit the flaw in WPA2 -- the name for the encryption protocol -- "to read information that was previously assumed to be safely encrypted," said a blog post by KU Leuven researchers. "This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be
October 10, 2017

2017 Top 10 Communication Trends in Hotel Technology

Comments are off
GBS is proud to be a Mitel partner. Below are 10 top technology trends within the hospitality industry that Mitel is experiencing, and sharing. Clearly, the level of connectivity and the ability of hotel guests to leverage the convenience and efficiency of high-performance technologies is constantly on the rise...and we're helping our hotel clients get there. Once long ago, hotels, motels and other hospitality businesses occupied a fairly simple space in people’s lives—they were a place for guests to lay their heads away from home. But anyone who’s spent time in the hospitality industry in the last several years knows that the role of technology in hospitality businesses has drastically expanded. In many cases, they’re becoming hubs of activity unto themselves. Most of this activity relies directly or indirectly on technology, making IT more important to hotel operations and the guest experience than ever before. So we’re here to share ten of the top communication technology trends in hospitality today. Check them out. Think about which ones make sense for your business. And if you see an opportunity, you can get out in front and begin planning accordingly. After all, in hospitality, every advantage counts. 1. Mobile Device as Door
September 22, 2017

Get to Know GBS Better

Comments are off
At GBS, our approach and mission are singularly focused – we turn technology into competitive advantage for our clients. It’s that simple. We serve our clients by solving their challenges through the implementation of a suite of technologies that are both business viable and technically sound. What Makes GBS Uniquely Qualified? Knowledge: No other provider has the depth of knowledge, experience and resources across the IT and Digital Landscape. And because of our depth of knowledge, we are leaders in developing innovative solutions to even the most technically challenging business problems. Starting as one of the first to offer Managed IT Services in the Greater Cincinnati / TriState region to today - delivering a comprehensive suite of solutions including: - Managed Services - IT Solutions - Audio/Video Solutions - Cabling Solutions, and - Telephony Solutions One Technology Provider All technologies today are IP-based. So, you need a partner who has deep knowledge of Information Technology and how it all integrates with one another. GBS understands that every network connected device, or an IoT device such as a Vending Machine, HVAC system, Vehicle sensor, elevators, etc. – they all touch the network. And our decades of experience designing, installing and maintaining
At GBS it's our mission to drive business results through the engineering and deployment of high-performance technologies. And as specialists in helping B2B companies succeed, we thought this article written by our ShoreTel partner was highly relevant. Watch how a ShoreTel Cloud-based Communications phone system can help you drive results. WRITTEN BY KATIE KREGEL, DIRECTOR, GLOBAL CORPORATE MARKETING / SHORETEL Digital is part of everyday life, which means all companies and industries need to have a digital strategy to remain competitive. Yet, new research from McKinsey shows that B2B companies fall short of B2C companies when it comes to digital advancements. While B2B companies face more challenges when it comes to digitization (they have to deal with more decision-makers in the buying cycle, for example), B2B customers are coming to expect, and even demand, access to digital tools for evaluating products and services and for making purchasing decisions. Going a step further, these same customers want greater transparency around pricing and a more positive, proactive sales experience. In total, this points to the need for B2B companies to make up ground in digital technology investment. McKinsey points to four key areas—Strategy, Organization, Skills Deficit, and Culture—where closing the digital gap
In a recent BBC article, it was highlighted that the personal information of more than 200 million American's was accidentally left open to the public. The magnitude of the data oversight is significant - involving the possible exposure of nearly 62% of the entire US population's data, much of it very personal. The size of that breach is 1.1 terabytes of data...that's a big file! Included in the data are: birthdates, home addresses, telephone numbers, political leanings, suspected religious affiliations, and ethnicities. This data was collected by Deep Root Analytics, a marketing firm whose data is used by political parties in predictive analytic models. Although specific details of how the breach occurred are not clear, at this early point in the storyline, it appears to GBS that Deep Root Analytics and their internal security processes were sloppy at best. For more than twenty years, GBS has been helping secure our client's data and ensuring their critical data is available when and where they need it. We understand that without your data secured and available - you're not fully "in business". Contact GBS to discuss how our experts use high-performance technologies to protect and secure your data.
July 19, 2017

Microsoft adds new Office 365 apps for SMBs

Comments are off
Office 365 is the ideal productivity tool for small- and medium-sized businesses. It’s cost-effective and receives plenty of support and upgrades from Microsoft. During last month’s Inspire conference, they announced even more applications for Office 365 that you will love. Microsoft Connections Email marketing campaigns are a great way to build relationships with contacts and increase sales, but they’re often difficult to manage. With Microsoft Connections, you can easily launch a campaign in minutes using pre-designed templates for newsletters, referrals, and promotions. As you acquire more contacts, Connections allows you to segment your mailing list so you can target different customers. For instance, you can send product promotions to clients who have stayed with your business for more than six months. After firing off your emails, performance charts track important metrics like open rates, clickthrough rates, new sign-ups, and canceled subscriptions that can be used to improve future campaigns. Microsoft Listings Microsoft Listings helps you seamlessly manage your online presence. Whenever you update your business profile, Listings automatically publishes those changes across your Facebook, Google, Bing, and Yelp accounts, allowing you to keep important information like business hours up to date. What’s more, Listings includes a web dashboard where you