by gcstco | Apr 15, 2022 | Blog, News
On Identity Management Day, it’s time for businesses of all sizes to take the our workforce identity audit. Saying the pandemic changed the way we work is an understatement. While the world has adapted to different forms of work—remote, hybrid, and work from...
by gcstco | Apr 14, 2022 | Blog, News
What is VAT accounting software? Value Add Tax or VAT is a consumption tax apply on a variety of goods and services which must be pay by the customer. The tax is calculate and applied to goods and services starting from manufacturing to the sale. A VAT accounting...
by gcstco | Mar 29, 2022 | Blog, News
From the Shotgun Approach to Triple Extortion: The Evolving Ransomware Threat . In the (relatively) brief history of computer crime, many kinds of attacks have, for one reason or another, become obsolete and faded from view. Ransomware, however, is only becoming more...
by gcstco | Mar 27, 2022 | Blog, News
Eugene KasperskyMarch 16, 2022 Eugene’s open letter in response to the warning against the use of Kaspersky products by the German Federal Office for Information Security (BSI). In the last three weeks, the war in Ukraine has shattered the world we knew. Families,...
by gcstco | Mar 13, 2022 | Blog, News
Google reported their first 2022 zero-day vulnerability (CVE-2022-0609) in Chromium that threat actors are currently exploiting in the wild.This vulnerability affects all Chromium users, regardless of which OS is running. It includes browsers like Chrome and Microsoft...
by gcstco | Feb 28, 2022 | Blog, News
We need to pivot from the concept of government IT spending to government IT investing, because only then will federal agency leaders understand and expect to get something in return. Otherwise, there’s no way to measure the value of the...