by gcstco | Dec 30, 2022 | Blog, News
In today’s world of information technology, insider threats are one of the primary reasons for security breaches. The definition of insider threat includes not just intentional malicious actions but also accidents and cases of negligence. According to the Ponemon...
by gcstco | Dec 29, 2022 | Blog, News
For many industrial control systems (ICS), trust has historically been assumed. They were designed with a presumption that the asset owner and manufacturers knew what should and should not be trusted as critical to their systems. As we continue in an era of OT and IT...
by gcstco | Oct 5, 2022 | Blog, News
A cash wallet is where you keep your valuable cash. If you lose it, you lose your money. So you keep it physically secure at all times and don’t give it to anyone else. A digital wallet is used to store valuable digital currency. A digital wallet needs a key to open...
by gcstco | Oct 3, 2022 | Blog, News
As the number of new data privacy regulations and programs coming into effect in the US continues to increase, one of the latest to emerge is the Cybersecurity Maturity Model Certification (CMMC) program. Unlike most of the current state-specific US data privacy...
by gcstco | Oct 2, 2022 | Blog, News
Posted byZoran Cocoara September 19, 2022Posted inMacs in the enterprise In the last ten years, Macs have gradually made their way into the workplace. Their number has increased through Apple’s own efforts to improve their products for use in the enterprise such as...