by gcstco | Aug 9, 2021 | Blog, News
From personal data and health records to bank account information, health insurance providers collect a vast amount of highly sensitive information about their customers. As a consequence, they have become an attractive target for cybercriminals, but are also plagued...
by gcstco | Aug 8, 2021 | Blog, News
An information security guide can help minimize related errors, but writing one from scratch is quite challenging. To that end, we offer a general plan, a basic guide to which you can add points specific to your company and its rules and regulations. In our opinion,...
by gcstco | Aug 8, 2021 | Blog, News
If the pandemic has been the biggest accelerator to digital transformation, then a lack of change management might be the most significant restrictor to progress. Companies across the country were quick to adapt to remote working, ensuring employees had the equipment,...
by gcstco | Aug 2, 2021 | Blog, News
It has been almost five years since the source code of the notorious MIRAI IoT malware was released to the public by its author in late 2016. This event led to the emergence of numerous copycats, creating their own flavors of IoT botnet armies. Although improvements...
by gcstco | Jul 28, 2021 | Blog, News
Zoom’s presentation at RSA Conference 2021 focused on end-to-end encryption in Zoom Cloud Meetings. The company explained why its developers are focusing on the issue, how they plan to make calls more secure, and what other new, security-related features users can...