Latests

Some would say Cyber Security can “wait” because it’s not “that” important- GCS encourages you to think again! Businesses need to make a fundamental change in their approach to cybersecurity and re-prioritize budgets to align with this newly defined reality of our modern society. 1. 95% of hacked records came from three industries in 2016 Technology, retail stores, and the government. Hackers usually target these groups because...

Read More

Cyber Phishing occurs when hackers aim to obtain confidential information from Internet users by sending an infected email that is disguised  as a well known organization. The email contains links to fake websites that look very similar to the real one. Currently, cyber criminals are aiming to attack many operating systems to attain as much data as possible; the more data, the better the chances of...

Read More

          Cyber Security is vital to business continuity; it also improves workflow as a whole. When your technology and computer systems are outdated, the chance of experiencing a vast array of cybersecurity breaches dramatically increases tenfold. What risk does this pose to businesses and how can you protect your business? High Risks Frequently, there are reports of data breaches amongst well-known businesses; the cyber hackers will usually choose...

Read More

The U.S.  Department of Homeland Security's Cybersecurity & Infrastructure Security Agency (CISA) has gone public recently with a warning to Microsoft Windows users regarding a critical security threat- also known as the BlueKeep Vulnerability. This latest report warns us it's now a race against the clock against hackers which makes this vulnerability a ticking time bomb for businesses. The way  Bluekeep works is it can...

Read More

It has been reported that Hackers working within China’s Ministry of State Security have hacked into networks of eight well known Managed Service Providers as part of an agenda to steal commercial secrets from the MSPs’ customers, as you can see in this Reuters report.   Known as the Island Hopper attacks, they were able to attack: Computer Sciences Corp. Dimension Data DXC Technology HP Enterprise IBM ...

Read More