Top 10 Best of CES 2018

Posted by Gulf South Technology Solutions on Sep 18, 2018 11:05:36 AM

CES 2018: What you may have missed

Read More

5-Step Security Compliance for SMBs

Posted by Gulf South Technology Solutions on Sep 12, 2018 9:44:00 AM

What is security compliance?

Read More

4 Steps to Better Printer Services

Posted by Gulf South Technology Solutions on Sep 10, 2018 9:05:03 AM

4 steps to better print security

Read More

The 4 Biggest Data Breaches You've Been Hit With And What You Should Do Next

Posted by Gulf South Technology Solutions on Sep 5, 2018 9:31:05 AM

It seems nowadays that data breaches are occurring so frequently that it’s almost becoming routine. The new norm perhaps?  We hope not! Companies are being hacked more now than ever, and it's likely that at some time or another you will find yourselves on the nasty side of a data breach.

Read More

Are You Making The Most Of The Cloud?

Posted by Gulf South Technology Solutions on Aug 29, 2018 10:00:00 AM

Many businesses have leapt headfirst into cloud technology, only to abandon it later when it failed to live up to the hype. Despite this, technology research firm Gartner predicts that cloud adoption will grow 18 percent in 2017, driven by its promise to deliver agility, growth and cost savings.

Read More

A Successful Cloud Migration Requires Good Planning

Posted by Gulf South Technology Solutions on Aug 27, 2018 9:16:18 AM

Research and advisory firm Gartner predicts that by 2019, up to 30 percent of new software will be cloud-only. For today's businesses, the cloud already offers clear benefits of agility, scalability, cost and innovation.

Read More

How To Keep Your Devices Safe In Public

Posted by Gulf South Technology Solutions on Aug 22, 2018 10:29:00 AM

Physical security has become second nature to most of us. When we leave the house, we lock our doors. We wait to hear the reassurance of that chirp letting us know our car is locked as we head into the store. We would never dream of leaving our most valuable possessions out somewhere in public, unattended, for someone to steal.

Maybe it's the intangibility of it all, but for some reason, many of us don't seem to be as concerned with cybersecurity, despite the severity of the associated risks.

As the general public becomes more aware of the importance of cybersecurity (particularly due to some major mishaps made public), people are finally starting to take it seriously. With the help of a few simple basics, you can keep your devices and your connections secure.

Keep your name secure

You already know that your device is yours, so there's no reason to use your first or last name (or both) as a device name. Doing so opens you up to even more vulnerability. For iPhone users, your device name may default to the name you have associated with your iTunes account; however, this can still be changed in your settings under General >> About >> Name.

Lock up your laptop

Regardless of how trustworthy your co-workers or peers may be, it's not their responsibility to look after your device. If you're going to step away for a moment, make sure to lock your computer. Better yet, if you'll be gone for more than just a few minutes, shut it down. This will enable disk encryption, making your device even more secure.

In a matter of seconds, a tech-savvy passerby with ill intent and a USB device could do some serious damage to an unlocked device. While logging back in or booting back up may be a hassle, it's simply not worth the risk.

While you may think that the data you have on your device would be unappealing to others, you might be surprised if you really stopped to think about what they could be getting their hands on. Not only can confidential data be extracted, but access to social media or email accounts could be just as detrimental.

In addition to keeping your device secure when you're away, it's important to consider security while it is in use. Always make sure to use a privacy filter on your device screen to prevent others from easily peeking at your screen while you are viewing potentially sensitive material.

Forget known networks

Once you wrap up your work on a network that you'll no longer need to use, make sure your device "forgets" it. If possible, do so before you head out the door. iOS devices, like the iPhone, don't allow you to forget a network unless it is still in range. The only way to delete a known network once you have left is to reset your network settings. Simply go to Settings >> General >> Reset >> Reset Network Settings.

Save the Bluetooth for your home

Think about it. Bluetooth is a way to connect to another device wirelessly. If it's that quick and easy for you to connect, doesn't it make sense that it would be just as easy for someone else to connect to you? Using Bluetooth in a shared space opens you up to the risk of someone else accessing your device without ever needing to physically connect with it. Stick to wired connections at the office, and save the Bluetooth for your own private connection at home.

"How To Keep Your Devices Safe In Public." The Kim Komando Show, 2018,

Read More

You're Missing Out On What Google Can Really Do!

Posted by Gulf South Technology Solutions on Aug 21, 2018 8:45:30 AM

What does Google mean to you? Maybe it’s just how you search the internet. Maybe Google Docs is your main word processing program. Maybe it’s your email provider. That’s as far as many people go with Google, but the company offers way more than that.

Read More

Counting Down The Biggest Hacks Of 2017

Posted by Gulf South Technology Solutions on Aug 15, 2018 11:00:00 AM

As 2017 is quickly coming to an end, it’s time for all the “best of” lists to come out along with the “worst” lists.

Read More

6 Biggest Cyber-Threats Of This Year

Posted by Gulf South Technology Solutions on Aug 14, 2018 11:00:00 AM

Read More