• Federal Holidays Observes by GCS for the Year 2017 – 2018
    Comments Off on Federal Holidays Observes by GCS for the Year 2017 – 2018

    Year 2017 Sunday, January 1, 2017 New Year‘s Day Monday, January 2, 2017 New Year‘s Day (observed) Tuesday, July 4, 2017 Independence day Monday, September 4, 2017 Labor Day Thursday, November 23, 2017     Thanksgiving Monday, December 25, 2017 Christmas Year 2018 Monday, January 1, 2018 New Year‘s Day Wednesday, July 4, 2018 Independence day…

    Read more
  • What is Ransomware?
    Comments Off on What is Ransomware?

    Ransomware is a type of malware that locks users out of their computers and requires a fee to return access to the computer. More sophisticated forms encrypt files on the hard drive making it very difficult to decrypt without paying the fee. Once the fee is paid, the malware isn’t necessarily gone; it could be…

    Read more
  • Security is expensive But not implementing is 1000 times more expensive
    Comments Off on Security is expensive But not implementing is 1000 times more expensive

    A massive breach of medical records containing confidential personal information has prompted both federal and state investigations. It all started when CBS 2 Investigator Dave Savini got a tip about what a dumpster diver found in the trash. Suburban Lung Associates has numerous offices affiliated with major hospitals. The Northbrook company is responsible to store…

    Read more
  • Google’s Project Zero Exposes Windows 8.1 Security Flaw
    Comments Off on Google’s Project Zero Exposes Windows 8.1 Security Flaw

    Windows 8.1 allows low-level users to gain administrator privileges. It has been 90 days since Google found the security issue, however there is still no fix from Microsoft. This security hole was found as part of Google’s Project Zero initiative, which finds weaknesses in software in hopes that the developers can create solutions before hackers…

    Read more
  • Snowden Documents Show the Scope of NSA
    Comments Off on Snowden Documents Show the Scope of NSA

    In light of the NSA documents released by Edward Snowden, we are able to see what levels of encryption the NSA struggled to break through. German News Station Der Spiegel, has revealed the holes in the NSA’s encryption breaking programs. It turns out that there are some networks that the NSA just can’t break at…

    Read more
  • Information Theft: It is Easier to Prevent Than to Clean Up
    Comments Off on Information Theft: It is Easier to Prevent Than to Clean Up

    It is unfortunate, but every now and then we come across a similar information theft story. In this case, it was a restaurant whose poor security resulted in stolen credit card information. The medium sized restaurant had a few point of sale (POS) terminals and a single computer in the manager’s office which was also…

    Read more
  • Planning the First 10 Minutes of Your Workday Matters
    Comments Off on Planning the First 10 Minutes of Your Workday Matters

    If you’re occupied in the kitchenette of Anthony Bourdain, legendary chef of Brasserie Les Halles, best-selling author, and well-known TV character, you don’t dare so much as boil warm water without attending to a ceremonial that’s necessary for any self-respecting chef: mise-en-place. The “Meez,” as specialists call it, interprets into “all in its place.” In…

    Read more
  • Successfully Use Email Auto responders
    Comments Off on Successfully Use Email Auto responders

    Mail auto responders are one-to-one emails sent to a subscriber on your list that are activated to add value to the knowledge a person has with your business online. Auto responders are activated by an act taken on your web or by a regulator set by your team, either best outfits the situations of the…

    Read more
  • Is Your Company Adequately Protected if Your Site is Hacked?
    Comments Off on Is Your Company Adequately Protected if Your Site is Hacked?

    You can’t choice the newspaper or melody in to the newscast deprived of earshot about the latest cyber-attack against a protuberant commercial. Most particularly, there’s Target, who’s CEO, Gregg Steinhafel, was involuntary to step depressed last month following one of the biggest hack attacks ever charted. The regular cost to a small company for a hack…

    Read more
  • Don’t Let Your Mobile Device be Hacked While Charging It
    Comments Off on Don’t Let Your Mobile Device be Hacked While Charging It

    Always since I erudite about the threat of “juice-jacking”, the probability that working your mobile device into a accidental control accusing position using a USB string might risk the data on that expedient. I have been additional watchful around transporting a good power-outlet accusing connector on my voyages. But in the insufficient cases when I overlooked or…

    Read more

Skokie Location

5152 Main Street
Skokie, IL 60077
Tel: (847) 763 0763
Fax: (847) 763 1308

Chicago Location

77 W Washington St
Chicago, IL 60602-2803
Tel: (312) 739 2427
Fax: (847) 763 1308

Glenview Location

4725 Locust Ave
Glenview, IL 60025
Tel: (847) 972 2062
Fax: (847) 972 2090

Certified Chicago IT Consulting Company

Microsoft Certified Gold Partner

Great Computer Solutions, Inc. BBB Business Review

Search

Support


Back to Top

jQuery(document).ready(function($) { $(function(){ //Snag the URL of the iframe so we can use it later var url = $('.arve-embed-container iframe').attr('src'); $('p.video-button a').click(function() { $('.arve-embed-container').show(); //Below we remove the URL to stop the video from playing, here we add it back in $('.arve-embed-container iframe').attr('src', url); }); $('fancybox-close').click(function() { $('.arve-embed-container').hide(); //Assign the iframe's src to null, which kills the video $('.arve-embed-container iframe').attr('src', ''); //$("video").prop('muted', true); //$('#playerID').get(0).stopVideo(); }); }); });