by gcstco | May 11, 2023 | Blog, News
Information about what you eat, what you watch, who you text, who you sleep with and where you’re going on vacation has long been a commodity. You basically give it to your browser for free, which then passes it on to companies you have no interest in for them to...
by gcstco | May 4, 2023 | Blog, News
Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations. Targeted e-mail attacks aren’t limited to spear phishing and business e-mail compromise (BEC). Another serious threat is conversation...
by gcstco | Apr 24, 2023 | Blog, News
Ransomware. Nasty. But how to build defenses against it? Rather – what should be protected first and foremost? Often, Windows workstations, Active Directory servers, and other Microsoft products are the prime candidates. And this approach is usually justified. But we...
by gcstco | Apr 14, 2023 | Blog, News
IT companies were the first to go open source, and many large businesses followed suit. After all, the ability to reuse and independently modify code as well as fix bugs spurs rapid innovation and cost reduction. But open source has some inherent negative...
by gcstco | Apr 5, 2023 | Blog, News
How to store and process personally identifiable information in a company with minimum risks. Governments of many countries are tightening the laws that regulate working with personal data. At the same time, the number of data leaks is only growing from year to year....