<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2556178958040836&amp;ev=PageView&amp;noscript=1">

5-Step Security Compliance for SMBs

Posted by Gulf South Technology Solutions on Sep 12, 2018 9:44:00 AM

What is security compliance?

Being security compliant means your IT protocols follow prevailing local and international industry standards, as well as adhere to any laws that apply in your locality.

Examples include adhering to local privacy and security of personal information laws if, for example, you record your customers’ personal and/or financial details. There are also global standards, such as theISO/IEC 27000 family, that relate to the security of information management systems and are considered best practice.

These standards are there to help organizations keep their information assets secure. Your business could be subject to fines or worse if you don’t act to adequately protect your data assets.

Read Article

4 Steps to Better Printer Services

Posted by Gulf South Technology Solutions on Sep 10, 2018 9:05:03 AM


4 steps to better print security

It is all too easy to forget about printers, stuck away in the corner of the office. But just think about some of the sensitive data and documents you send to your printer. The fact is, printers are no longer just a dumb peripheral, they are increasingly sophisticated and networked – which makes them an easy source for a security breach.

But like any networked device, they have the potential to expose your business to hackers, and risk your sensitive data and reputation.

Ultimately, your printer fleet, just like the rest of your IT infrastructure, needs to be monitored, managed and protected. Fail to implement some basic security controls, and you risk facing the financial, legal and reputational implications of a security breach.

Follow these four guidelines to ensure your printer fleet conforms to industry best practice and doesn’t risk being compromised.

Read Article

The 4 Biggest Data Breaches You've Been Hit With And What To Do Next

Posted by Gulf South Technology Solutions on Sep 5, 2018 9:31:05 AM

It seems nowadays that data breaches are occurring so frequently that it’s almost becoming routine. The new norm perhaps?  We hope not! Companies are being hacked more now than ever, and it's likely that at some time or another you will find yourselves on the nasty side of a data breach.

Read Article

Are You Making The Most Of The Cloud?

Posted by Gulf South Technology Solutions on Aug 29, 2018 10:00:00 AM

Many businesses have leapt headfirst into cloud technology, only to abandon it later when it failed to live up to the hype. Despite this, technology research firm Gartner predicts that cloud adoption will grow 18 percent in 2017, driven by its promise to deliver agility, growth and cost savings.

Read Article

A Successful Cloud Migration Requires Good Planning

Posted by Gulf South Technology Solutions on Aug 27, 2018 9:16:18 AM

Research and advisory firm Gartner predicts that by 2019, up to 30 percent of new software will be cloud-only. For today's businesses, the cloud already offers clear benefits of agility, scalability, cost and innovation.

If you’re looking to adopt the cloud for your business, thorough pre-planning is essential for a smooth migration. Here’s what you'll need to consider.

Read Article

How To Keep Your Devices Safe In Public

Posted by Gulf South Technology Solutions on Aug 22, 2018 10:29:00 AM

Physical security has become second nature to most of us. When we leave the house, we lock our doors. We wait to hear the reassurance of that chirp letting us know our car is locked as we head into the store. We would never dream of leaving our most valuable possessions out somewhere in public, unattended, for someone to steal.

Maybe it's the intangibility of it all, but for some reason, many of us don't seem to be as concerned with cybersecurity, despite the severity of the associated risks.

As the general public becomes more aware of the importance of cybersecurity (particularly due to some major mishaps made public), people are finally starting to take it seriously. With the help of a few simple basics, you can keep your devices and your connections secure.

Keep your name secure

You already know that your device is yours, so there's no reason to use your first or last name (or both) as a device name. Doing so opens you up to even more vulnerability. For iPhone users, your device name may default to the name you have associated with your iTunes account; however, this can still be changed in your settings under General >> About >> Name.

Lock up your laptop

Regardless of how trustworthy your co-workers or peers may be, it's not their responsibility to look after your device. If you're going to step away for a moment, make sure to lock your computer. Better yet, if you'll be gone for more than just a few minutes, shut it down. This will enable disk encryption, making your device even more secure.

In a matter of seconds, a tech-savvy passerby with ill intent and a USB device could do some serious damage to an unlocked device. While logging back in or booting back up may be a hassle, it's simply not worth the risk.

While you may think that the data you have on your device would be unappealing to others, you might be surprised if you really stopped to think about what they could be getting their hands on. Not only can confidential data be extracted, but access to social media or email accounts could be just as detrimental.

In addition to keeping your device secure when you're away, it's important to consider security while it is in use. Always make sure to use a privacy filter on your device screen to prevent others from easily peeking at your screen while you are viewing potentially sensitive material.

Forget known networks

Once you wrap up your work on a network that you'll no longer need to use, make sure your device "forgets" it. If possible, do so before you head out the door. iOS devices, like the iPhone, don't allow you to forget a network unless it is still in range. The only way to delete a known network once you have left is to reset your network settings. Simply go to Settings >> General >> Reset >> Reset Network Settings.

Save the Bluetooth for your home

Think about it. Bluetooth is a way to connect to another device wirelessly. If it's that quick and easy for you to connect, doesn't it make sense that it would be just as easy for someone else to connect to you? Using Bluetooth in a shared space opens you up to the risk of someone else accessing your device without ever needing to physically connect with it. Stick to wired connections at the office, and save the Bluetooth for your own private connection at home.

Schedule A Free Risk Assessment

How To Keep Your Devices Safe In Public. The Kim Komando Show, 2018

Read Article

You're Missing Out On What Google Can Really Do!

Posted by Gulf South Technology Solutions on Aug 21, 2018 8:45:30 AM

What does Google mean to you? Maybe it’s just how you search the internet. Maybe Google Docs is your main word processing program. Maybe it’s your email provider. That’s as far as many people go with Google, but the company offers way more than that.

Google fans looking to get more out of their online experience will discover there are plenty of new worlds to explore, especially when it comes to Docs, Google’s online office suite.

Let’s dive into some of Google’s overlooked abilities. We will focus on what you can do with Google Docs but also look at some fun extras from elsewhere in the Google universe.

Read Article

Counting Down The Biggest Hacks Of 2017

Posted by Gulf South Technology Solutions on Aug 15, 2018 11:00:00 AM

As 2017 is quickly coming to an end, it’s time for all the “best of” lists to come out along with the “worst” lists.

The technology world is no different. Santa has been keeping track of all of those on his naughty list and hackers seem to be at the top!

We won’t soon forget about the Russian hackers who were accused of infiltrating the 2016 presidential election. The U.S. intelligence community confirms Russia did hack at least 21 states last year but the total impact is still unclear.

Read Article

6 Biggest Cyber-Threats Of This Year

Posted by Gulf South Technology Solutions on Aug 14, 2018 11:00:00 AM

Hackers are constantly finding new targets and refining the tools they use to break through cyber-defenses. The following are some significant threats to look out for this year to stay safe.

Read Article

3 Security Mistakes You Shouldn't Let Your Small Business Make

Posted by Gulf South Technology Solutions on Aug 9, 2018 8:47:48 AM

The phrase any business owner most dreads hearing at the moment is probably, "data breach." A data breach means you failed to protect your customers' information and that you're about to lose the trust of your clientele.

True, it seems like every major company has had a data breach in the past year, but while a big company can survive the PR nightmare, a small business often can't.

Even worse, if the big boys can't keep hackers out of their systems, how can a smaller company that's operating on a shoestring hope to stay safe? It seems almost impossible.

Fortunately, avoiding some basic mistakes that companies of any size can make will help minimize the risk. Taking care of these won't make you 100 percent safe, but it should make a data thief's job harder.

So, let's get started on protecting your business.

Read Article