Remote Work Solutions

Working Remotely has been a key step in combating this pandemic. Now is the time to ask yourself this critical question – Has our organization’s work-from-home plan fully protected the long-term interests and security of the company? GBS has seen several companies put themselves and their employees at risk from bad on-line actors. Our technicians know the products, solutions and policies that we’ll help implement to protect your company and

Read More

MICROSOFT WINDOWS & CITRIX SECURITY NOTICES – ACTION RECOMMENDED

Microsoft Windows Vulnerability Notice & Citrix Vulnerability Notice Notice: Today, Microsoft is releasing a security patch – it is critically important to execute this patch! The security of your organization’s network may depend on it. According to KrebsonSecurity and multiple trustworthy industry sources, a vulnerability resides in a Windows component that handles “certificate and cryptographic messaging functions in the CryptoAPI.” The Microsoft CryptoAPI enables developers to secure Windows-based applications using

Read More

Join GBS at comSpark 2019 – Oct. 8

Join GBS at comSpark – if you haven’t already – register today! comSpark is this region’s premier conference on all-things IT, all-things technology. Stay tuned for more information on when you can see GBS presentations on CyberSecurity, The C-Suite Summit and a Break-out Session on the role Video Analytics plays in Data Security. Stay tuned for more details!

Read More

ACTION RECOMMENDED – UPGRADE OUTDATED WINDOW 7 SERVERS & COMPUTERS

The following legacy OS versions (Windows 7 / XP / XP Pro / XP Embedded and Windows Server 2008 / 2003) are susceptible to CVE-2019-0708, a critical Remote Code Execution vulnerability. Given the potential impact to customers and their businesses, Microsoft has made the security updates available for platforms that are no longer offered mainstream support. View MS Patch Despite the patches being made available by Microsoft, GBS recommends moving away from

Read More

Detecting & Preventing Malware – Threat Correlation

WATCH THREAT CORRELATION VIDEO One of the key components of detecting and preventing a cyber attack is the ability to correlate network and endpoint security events. The ability to see and correlate security-related events gives administrators the visibility they need to stop unknown and evasive threats before the damage is done. Additionally, the ability to correlate events prevents successful attacks from spreading to other computers and other departments. Correlation allows administrators to:

Read More
GBS Techknowledge Base Logo

Sign up for our Newsletter

Relevant | Timely | IT-based Business Technology Information

Techknowledge Base Subscription