Networked Audio/Video – Signs You’re Ready

Networked Audio Video

Networked AV or AV over IP (Audio-Visual over Internet Protocol) are different monikers for the same technology. This technology delivers the ability to transmit audio, video, metadata, and control signals over your organization’s existing network cable infrastructure – this assumes a Cat6 cabling infrastructure (minimum) which supports 1 Gigabyte bandwidth. AV Standards Have Changed ALike […]

3 Ransomware Prevention Technologies

Three Ransomware Prevention Technologies

Three ransomware prevention technologies are key elements in the fight to reduce cyber risk, and the chances of being held for ransom. Everyone within the IT industry knows that a multi-layered defense is the best defense against any cyber attack. However, Aamir Lakhani with Fortinet reports a significant disparity among the responses and the actions […]

A Credential Harvesting Attack – How it was Detected & Stopped

As a proud Barracuda partner, GBS has adapted the original post, “Anatomy of a Sentinel Catch”, authored by Thorsten Stoeterau, Field Systems Engineer.

Within this post, Thorsten dissects a classic credential harvesting attack. He shows how an attack works, why it is so important to understand their anatomy, and how Barracuda Sentinel worked to detect and stop the attack. Sentinel is one of the key email protection solutions that is part of Barracuda’s Total Email Protection bundle.

GBS – Now an Aruba KETS Partner

GBS selected by Aruba as a KETS Partner

GBS is now an Aruba KETS partner on the Kentucky Education Technology System (KETS) contract. Aruba is a Leader in the 2021 Gartner® Magic Quadrant™ for the Wired and Wireless LAN Access Infrastructure. GBS is extremely proud to join Aruba who has been ranked “A Leader” by Gartner 16 consecutive years. GBS & Aruba KETS partnership – […]

Log4j Zero-day Vulnerability News

GBS monitors Log4J vulnerability

GBS is proactively monitoring the situation. We are working with our partners and clients to limit the exposure brought about by this vulnerability. THREAT SUMMARY:The Java software library “log4j” features a significant technical vulnerability and istherefore a potential gateway for cyber-attacks. The focus is on applications that canbe accessed from the Internet and that use […]

Wireless Presentation Systems – 5 Benefits

Wireless Presentation 5 Benefits

Wireless Presentation capabilities are essential for efficient, highly effective presentations. Below are the 5 benefits your organization will experience by adding wireless presentation capabilities to your meeting spaces. A Real-World Scenario – When Wireless Presentation Capabilities Aren’t Available You have a high-profile presentation to internal stakeholders, you’ve developed PowerPoint slides and it’s 5 minutes before […]