Join GBS at comSpark 2019 – Oct. 8

Join GBS at comSpark – if you haven’t already – register today! comSpark is this region’s premier conference on all-things IT, all-things technology. Stay tuned for more information on when you can see GBS presentations on CyberSecurity, The C-Suite Summit and a Break-out Session on the role Video Analytics plays in Data Security. Stay tuned for more details!

Read More


The following legacy OS versions (Windows 7 / XP / XP Pro / XP Embedded and Windows Server 2008 / 2003) are susceptible to CVE-2019-0708, a critical Remote Code Execution vulnerability. Given the potential impact to customers and their businesses, Microsoft has made the security updates available for platforms that are no longer offered mainstream support. View MS Patch Despite the patches being made available by Microsoft, GBS recommends moving away from

Read More

Detecting & Preventing Malware – Threat Correlation

WATCH THREAT CORRELATION VIDEO One of the key components of detecting and preventing a cyber attack is the ability to correlate network and endpoint security events. The ability to see and correlate security-related events gives administrators the visibility they need to stop unknown and evasive threats before the damage is done. Additionally, the ability to correlate events prevents successful attacks from spreading to other computers and other departments. Correlation allows administrators to:

Read More
GBS Techknowledge Base Logo

Sign up for our Newsletter

Relevant | Timely | IT-based Business Technology Information

Techknowledge Base Subscription