by gcstco | Aug 9, 2021 | Blog, News
From personal data and health records to bank account information, health insurance providers collect a vast amount of highly sensitive information about their customers. As a consequence, they have become an attractive target for cybercriminals, but are also plagued...
by gcstco | Aug 8, 2021 | Blog, News
An information security guide can help minimize related errors, but writing one from scratch is quite challenging. To that end, we offer a general plan, a basic guide to which you can add points specific to your company and its rules and regulations. In our opinion,...
by gcstco | Aug 8, 2021 | Blog, News
If the pandemic has been the biggest accelerator to digital transformation, then a lack of change management might be the most significant restrictor to progress. Companies across the country were quick to adapt to remote working, ensuring employees had the equipment,...
by gcstco | Aug 5, 2021 | Blog, News
As part of our continuing effort to enhance the Device42 user experience, v17.04.01 includes user interface improvements on our Devices list pages and Business Applications canvas; v17.04.01 also includes multiple bug fixes. Devices List Page Preview with Column Order...
by gcstco | Aug 3, 2021 | Blog, News
Every company on the planet has technology assets to manage. It doesn’t matter if they’re traditional businesses or start-ups, they’ll have a combination of physical, virtual, on-premises, outsourced, SaaS and cloud. The evolution of this landscape often reflects the...
by gcstco | Aug 2, 2021 | Blog, News
It has been almost five years since the source code of the notorious MIRAI IoT malware was released to the public by its author in late 2016. This event led to the emergence of numerous copycats, creating their own flavors of IoT botnet armies. Although improvements...