A message of gratitude and hope from GSB Solutions
The entire GSB Solutions team would like to send this message full of thanks and good wishes to our collaborators, clients and partners.
The entire GSB Solutions team would like to send this message full of thanks and good wishes to our collaborators, clients and partners.
You were born 15 years ago. We worked hard to prepare for your arrival. Many sleepless nights have been worth it to see you grow, mature and develop. Thank you to all of us who are part of you and who are shaping you to be better. Congratulations for everything you have given us in…
Phishing: It is characterized by searching for personal information, names, addresses and security numbers. It uses links that redirect to suspicious sites, with URLs that seem to be legitimate and messages that manipulate the user. Vishing: It is an attack in which a false scenario is created to obtain personal information, it is done through…
Social engineering is a set of techniques used by cybercriminals to trick unsuspecting users into sending them sensitive data, infecting their computers with malware or opening links to infected sites. In addition, hackers may try to take advantage of a user’s lack of knowledge; due to the speed at which technology is advancing, many consumers…
In basic terms, desktop virtualization is a method of configuring a single host computer to support multiple user workstations. End users connect remotely to their workstations, also called virtual desktops. The virtual desktop is separate from the physical device used by the user to access it. Which are the benefits of desktop virtualization? The benefits…
Picture this: while anxiously awaiting the release of a limited edition sneaker, Tyler frequently checked his phone for SneakPeak Elite updates. One day, an email announced a pre-sale for loyal customers. Following the link, Tyler found a site identical to SneakPeak Elite and made his purchase with confidence. However, on Monday, unauthorized banking transactions revealed…
Did you know? Phishing comes from the word “fishing”, referring to use a bait and waiting for the victims to “take the bait”. What is Phishing? It is a method used by cybercriminals to deceive and obtain personal information, such as passwords, financial data, among others. How to recognize a Phishing? If you receive messages…
The construction of Tesla’s Gigafactory 5 in Santa Catarina, Nuevo Leon, Mexico, will be completed in record time: less than nine months. It will be the first in Latin America and the third outside the United States. According to the rating agency Moody’s Local Mx, the investment contemplated in this super project reaches US$5 billion…
We have an appointment you can’t miss! Participate in our next free webinar “The best practices of ITIL® 4 Foundation Certificate in IT Service Management”, which we will conduct with the business consultant, Rafael Cruz. Day: March 2 Time: 5:00 pm (Mexico City Time) Registration: https://gsb.lat/webinaritil/
On the eve of Christmas we want to share a very special message, our spokespersons, from different parts of the world, send their well wishes on behalf of the entire #GSB team Happy Holidays!