What is ChatGPT? ChatGPT is an advanced artificial intelligence (AI) chatbot specializing in natural language processing. With ChatGPT, you can engage in human-like conversations and receive assistance with various tasks such as answering questions, writing essays, creating emails, crafting PowerPoint presentations, and even coding software. ChatGPT is not the only advanced AI chatbot of its kind. Still, many of our references throughout this article focus specifically [...]
Windows Server 2012 and 2012 R2 will soon be unsupported by Microsoft and could pose serious risks for organizations using it after the official end-of-life date in October 2023. Potential Risks and Important Considerations Once Microsoft ends support for operating systems, security patches or updates, bug fixes, or technical support are no longer offered. What does this mean for your organization? Increased cybersecurity vulnerability: Operating on unsupported ope [...]
Undergoing an office relocation or opening additional locations to accommodate a growing team is a big step and a massive investment. GadellNet is here to evaluate a space for IT readiness. We aim to work with organizations early in their office relocation or expansion process to ensure IT readiness. We also look to uncover hidden costs associated with a space that cannot accommodate an organization's technology needs. Below are some of the pieces we look for during these engageme [...]
Partnering with a technology consultant can help your organization end up with the best protection. Cyber liability insurance coverage is a still-evolving landscape. A lot is changing, including the types of cybersecurity measures required for an insurer to cover an organization. In 2023, many insurers require Multi-Factor Authentication (MFA), Endpoint Detection and Response (EDR), and Security Information and Event Management (SEIM). This is a step up from the coverage requiremen [...]
When evaluating and comparing Managed Service Providers (MSP), many want to look at the options and lay them out in an apples-to-apples comparison. Something worth noting; there are over 7,500 varieties of apples. To help decode some common areas of importance, we have a few tips and questions you can ask during the exploratory stage of your search. Comparing Managed Service Provider Pricing Models Many pricing models exist in the world of MSPs - some a [...]
The cybercrimes landscape has changed drastically over the last few years with bad actors getting far more aggressive. Recent attacks have proven that no industry – hospitals, schools, manufacturers, government – is safe. However, as cyberattacks have increased, so have advances in cybersecurity defenses. EDR, or Endpoint Detection and Response technology, has had a significant impact in protecting organizations. What is EDR and does your organization need [...]
Third-party authentication apps, like Microsoft Authenticator, offer users a higher level of security than SMS or phone calls. But, as with all things cybersecurity-related, the tools that protect us must continue to evolve to stay ahead of bad actors. To bolster the security of push notifications, Microsoft announced new features to Authenticator’s two-factor authentication capabilities for mobile device users. Most notably among the updates, number matching and additi [...]
You've made the decision. You will outsource all or part of your IT functions to a Managed Service Provider (MSP). You've approached several vendors, looked at their website, and maybe even talked briefly with a sales rep. Now it's time to narrow down the options. That can be a time-consuming and confusing task. You're about to invest in a business-critical service, but you need to figure out who is full of potential and who is just full of it. Finding a Managed [...]
A scam that has regained popularity is centered around legitimate actions with Google My Business. Google My Business is an important marketing platform owned by organizations. Anyone with a Google account can request access to own or manage your My Business platform, and scammers take advantage of this loophole. How it works A scammer requests access to your Google My Business Account. You will receive an email with this request if you are the account owner. It comes from a legit [...]
Auto dealerships are now required to plan, implement, and maintain an Information Security Program to increase the private data security of individuals. Avoiding mishandling consumer data is the driving force behind this program. The Gramm Leach Bliley Act (GLBA) 15 U.S.C. § 6805, which calls for this, was designed to protect non-public consumer information collected and maintained by financial institutions. GLBA was implemented in 2003 and extended to auto dealerships in 2021. &n [...]