Green Street Technology Solutions' Blog
Technology Articles for small businessesGoogle Wants To Kill The URL
Google is developing a potential new way to stop website phishing. Have you ever had it when you go to a website and then you find out that it’s not really the website you thought it was? could be changed by such a way as a misspelling or link you clicked on had...
4 Tips that Will Boost Your SEO
Whether your business is small or large, search engine optimization (SEO) is one of the best marketing techniques that you can use to bring in targeted traffic to your website. To boost your SEO, you can pursue some essential tactics. These include blogging, social...
What Is Online Presence Management?
Get them to your site! It's one thing to have a website just sitting on the internet, but you also need to drive traffic to it. Online presence management is the art and science of doing exactly that. What good is a website if no one sees it? Keep reading to get your...
5 Tips for Getting to the Top of Google
Getting to the top of Google's organic search rankings is harder than ever before because Google has added so many features, like news snippets, video carousels, and paid advertising, that cut down on the number of websites that can appear on its first page. However,...
How Antivirus Software Has Metamorphosed into Endpoint Protection Software
Your business is growing, and your network is growing with it. As more and more human beings join in, they bring with them a whole zoo of personal devices and potential security threat vectors. You have to protect your network! According to Symantec, mobile malware...
Is Two-Step Verification Really as Effective as People Say?
Tech insiders have varied opinions when it comes to making the definitive determination if two-step verification is helpful or a hindrance in business. Two-step verification, through authentication apps and similar software programs, provides an extra layer of...
Mal – The Contagious Data Loss Grelin
He’s Mal the Maleficent, the perennial purveyor of disease, the one among the Six Data Loss Gremlins who enjoys mischief for the sheer pleasure of harming others. A trickster and a thief, Mal is unrelenting in his attempts to steal or destroy data. He employs all...
Foiling Klepto, the Sticky-Fingered Data Loss Gremlin
Meet Klepto, one of the Eight Data Loss Gremlins that can bring your business to its knees if you let them. Klepto does his best to grab his unfair share of the $445 billion that companies worldwide lose each year to cybercrime. Klepto is a real sicko. Greedy and...
Phishing with your phone
Scam artists have a new platform in their arsenal to obtain your financial information. They have taken to phone calls with a spoofed number to make it appear to be coming from a financial institution. I have been a victim of a phishing attempt where they called me...






