Grand Central Station Internet Services, Inc.

Taking Care Of Computers, Network, Security, Custom Software, Websites and More....for over 20 years !

Normal Business Hours: M-F 8:00 AM - 6:00 PM CDT
Serving Shreveport / Bossier City for over 20 years!

Normal Business Hours:
M-F 8:00 AM - 6:00 PM CDT
Serving Shreveport / Bossier City
for over 20 years!

318-682-4427

  • Home
  • About Us
    • Our History
  • Services
  • Contact
  • Support
    • Support Portal
    • Remote Login Assistance
  • Webmail
  • Cloud Backup Service
  • Blog

Is your Business Safe from Virtual Threats?

May 17, 2017 By Company Post

Is Your Business Safe from Online Threats?

Did you know that 50% of small business owners think their businesses are too small to be targeted by the thieves of the virtual world? Contrary to popular belief, 72% of hacker attacks often happen to smaller firms – firms with less than 100 employees! So how prepared is your SMB? Here’s a checklist to help you find out how vulnerable you are to these attacks.

1. Do you have Antivirus protection? – An antivirus software program can protect you from threats that originate from emails such as phishing and virus attacks. However, the most striking fact is that 61% of small businesses don’t install any antivirus software! If you are one of them, then it’s time to change!

2. How sturdy is your Firewall? – A good firewall system protects your computers from the variety of threats that exist in the virtual world. Examples include harmful cookies, viruses, worms and other such malicious programs used by hackers.

3. Do you use a Spam filter? – Using a simple spam filter for your emails keeps junk out of your inbox. The bonus to having a good spam filter is that your employees save time, as they are not distracted by irrelevant emails, but the major perk here is that the potential virus and phishing threats are lessened as spam emails are unlikely to be opened.

4. Do you do backup your data regularly? – Agreed – backups don’t really protect your data, but they are the only way to recover it if data loss does happen. So, be sure you have a regular and reliable backup plan in place – and it is actually being deployed.

Data loss can prove very costly—especially to SMBs, sometimes even resulting in them having to close down. Prevention is certainly better than a cure in such cases.

Filed Under: Blog

Is That Email a Phishing Scheme?

May 16, 2017 By Company Post

Is That Email a Phishing Scheme?

Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for the large number of people falling for fraudulent emails is that the phishing attempts are often so well-disguised that they escape the eyes of a busy email reader. Here are a few tips that help you identify whether that email really came from your bank or is another attempt at defrauding you…

1. They are asking for personal information – Remember, no bank or financial institution asks you to share your key personal information via email, or even phone. So, if you get an email where they ask for your ATM PIN or your e-banking password, something’s amiss.

2. The links seem to be fake – Phishing emails always contain links that you are asked to click on. You should verify if the links are genuine. Here are a few things to look for when doing that:

  • Spelling – Check for the misspellings in the URL. For example, if your bank’s web address is www.bankofamerica.com, a phishing scheme email could misspell it as www.bankofamarica.com or www.bankofamerica-verification.com
  • Disguised URLs – Sometimes, URLs can be disguised…meaning, while they look genuine, they ultimately redirect you to some fraudulent site. You can recognize the actual URL upon a mouseover, or by right clicking on the URL, and selecting the ‘copy hyperlink’ option and pasting the hyperlink on a notepad file. But, NEVER ever, paste the hyperlink directly into your web browser.
  • URLs with ‘@’ signs – If you find a URL that has an ‘@’ sign, steer clear of it even if it seems genuine. Browsers ignore URL information that precedes @ sign. That means, the URL www.bankofamerica.com@mysite.net will take you to mysite.net and not to any Bank of America page.

3. Other tell-tale signs – Apart from identifying fake URLs, there are other tell-tale signs that help you identify fraudulent emails. Some of these include:

  • Emails where the main message is in the form of an image, which, upon opening, takes you to the malicious URL.
  • Another sign is an attachment. Never open attachments from unknown sources as they may contain viruses that can harm your computer and network.
  • The message seems to urge you to do something immediately. Scammers often induce a sense of urgency in their emails and threaten you with consequences if you don’t respond. For example, threat of bank account closure if you don’t verify your ATM PIN or e-banking password.

Finally, get a good anti virus/email protection program installed. It can help you by automatically directing spam and junk mail into spam folders and deactivating malicious attachments.

Filed Under: Blog

Has Your Website Been Optimized for Mobile Users?

May 14, 2017 By Company Post

How 'Mobile' Is Your SMB?

Did you know that this year there will be more mobile web surfers than stationary ones? That means more prospects are accessing your business website more through their smart phones, tablets or other mobile devices than with a laptop or PC. If you thought you had time to make the switch this year, you may want to reconsider in light of new research. A recent study revealed that around 40% of prospects move on to a competitor if they have a poor mobile experience. How prepared is your business for this change? Well, if you are just starting out, the following checklist will help…

1. Make sure your mobile site is different from your regular website – While you must stick to your branding standards, your mobile website should be simpler than your web version. The reason being is that complicated designs that load well and look good on computers are often distorted when accessed through a mobile device. Plus, mobile surfers don’t really have the time to sift through a lot of content. Bottom line: your website’s mobile friendly version should be short, simple and sweet…offering your viewers the most important and basic sections of your website.

2. Option to access the actual website – That said, do provide your viewers with the option to access your regular website through their mobile device, as some viewers will prefer to stick with what is familiar.

3. Sitemap – Whether it’s your actual website or the mobile version, make sure you have a sitemap in place. A sitemap just makes it easier for your viewers to navigate through the site.

4. Get rid of flash – Most mobile devices don’t support flash. Keep this in mind when optimizing your website for the mobile surfer. Simple images that load fast are your best bet.

5. Testing – Make sure you test your mobile website thoroughly on different operating systems, browsers and devices. What looks good on one device might be totally distorted on another.

You could also develop a mobile application instead of a website, but most SMBs find that option too expensive and complicated. So, for now, put the 5 tips mentioned above into use and get your mobile-friendly website into action…

Filed Under: Blog

Five Ways Your Business Can Improve Its Search Engine Rankings

May 13, 2017 By Company Post

5 Tips for SMBs to Improve Search Engine Rankings…

In an age where most business happens online, not showing up in Google search results can really hurt you. While there’s no real shortcut to showing up consistently on web searches, there are a few quick fixes to get your site to show up on your potential customer’s search results…

1. HTML tags – Important HTML tags include the title tag, meta description and meta keywords. Make sure each page of your website has appropriate HTML tags. The title tag of each page should be unique and relevant to that particular page.

2. Alternative text images – Ensure that most of the images on your website have alternative text tags. Alt tags are basically descriptions for images. By adding relevant alternative tags to images, you are allowing search engines to recognize them, which will improve the likelihood of your page showing up in search results.

3. File hierarchy – How simple is your HTML file hierarchy? Check to see if your website’s pages are logically situated and avoid too many unnecessary folders. For example: ‘NFL=>Teams=>PittsburghSteelers’ is a better folder structure than ‘NFL=>Teams=>NFCEast=>PittsburghSteelers’, because here ‘NFCEast’ is redundant and only serves to push the Steelers page deeper down the order. This complexity makes your site less likely to show up on search results for people searching for Steelers websites.

4. Sitemap – A sitemap acts as a navigational guide for your visitors as well as search engines. Does your website have one? If not, then it’s time to put up a site map on your website.

5. Content quality – Read your website content to determine its quality. Is your content written for search engines or actual visitors? Is it stuffed with keywords? Does it truly add value to your audience, or is simply there to fill up the page? Answer these questions and make sure it has value for your audience. Value for your audience translates to better search engine rankings.

Filed Under: Blog

Five Things You Should Do Right Now to Preserve Your Network and Systems

May 12, 2017 By Company Post

5 Things SMBs Can Do Right Now to Preserve Their Network and Systems

1. Backup Files Every Day – As catastrophic as data loss is, the number of businesses that still are not backing up their network is unbelievable. According to the Symantec Small to Medium Size Businesses (SMB) data, only 23% of SMBs are backing up their data on a daily basis and fewer than 50% are backing up data weekly. Any number of events can result in data loss, so the importance of frequently backing up your network cannot be overstated.

2. Ensure Backup Procedures Are Checked Regularly – Many times business owners think that they have a backup system in place only to find out after it’s too late that it hasn’t been working properly. It may seem like your files are being backed up daily, however, the backup could have become corrupt or it is not backing up huge chunks of critical data. Check your backup procedures regularly to ensure they are working properly in order to be sure that ALL of your data can be recovered. In the age of BYOD (Bring-Your-Own-Devices) it is also important to frequently backup data on your employee’s personal laptops, iPads or Blackberrys, so make sure you have a procedure in place to check those backups as well.

3. Make Sure Updated Virus Protection and Firewalls Are Always Enabled – Far too many companies either have no virus protection, expired virus software licenses, or disabled virus programs that aren’t running at all. This makes their business technology vulnerable to virus attacks from emails, spam, data downloads, and unreputable websites. Further, because of inadequate firewall protection about 40% of small to medium businesses will have their network accessed by a hacker. Chances are, when these businesses are attacked they will be entirely unaware it is happening. In order to protect your valuable data and assets, ensure your virus protection is adequate, up-to-date and functioning properly and that your firewall is intact. Finally, don’t forget to update security patches and change passwords when an employee leaves in order to deter hacking attempts.

4. Monitor Server Drives – Dangerously full server drives can bring their own set of problems – ranging from program and server crashes to sluggish email delivery. Proactive monitoring and maintenance of your server can spare your business a lot of problems down the road.

5. Regularly Check Critical Built-In Logs – Very few problems with technology emerge suddenly. These problems typically progress over time and evolve into more serious problems. Frequently review your critical built-in log files to help identify the problem before it has gotten out of control and wreaks havoc on your business infrastructure.

Filed Under: Blog

  • « Previous Page
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • Next Page »

Our Philosophy

Here at GCS, we strive to put our customers first and look at the relationships with our clients as long term partnerships. Our company is driven by our clients needs and requests and not by trying to make your company fit into our profile. Following our strategy, you might notice we even carry products by competing companies. The reason is, … Read More

Contact Us

Normal Office Hours M-F
8:00 AM to 6:00 PM

Grand Central Station Internet Services
9308 Mansfield Road
Suite 600A
Shreveport , LA. 71118

318-682-4427

Copyright © 2022 Grand Central Station. All Rights Reserved.