Posts in Technology

Video calls can be a pain for hybrid offices. Tech companies say relief is coming.

October 3rd, 2022 Posted by Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Video calls can be a pain for hybrid offices. Tech companies say relief is coming.”

“It may look simple, but communication between hybrid and on-premises workers is anything but.”

Glenn Baruck, The eDot Family of Companies


According to experts, hybrid work has become commonplace for most companies and is here to stay. With the arrival of this new reality, office workers worldwide now face navigating this technological landscape often without support. These team members are experiencing technical challenges ranging from the dreaded echo to different conferencing application formats, connectivity issues and more. These challenges make video communication frustrating, complex and sometimes downright inequitable.

For more insight into this new frontier of communication and the latest tech on the way to rescue conference users, check out this article by Danielle Abril for Washingtonpost.com.

Read More

5 best tips for ransomware recovery

September 20th, 2022 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “5 best tips for ransomware recovery”

“Reality is that sooner or later, you will likely be hit by a ransomware attack. Best to be prepared.”

Glenn Baruck, eDot


The threat of a ransomware attack is as real today as it has ever been for your business or organization. Regarding network design, experts state that “Active Directory” is still at the core of most modern networks. This system for identity management, authentication and more, on-premises and in the cloud, is excellent but was created over twenty years ago.

Twenty years ago, there was little concern for ransomware attacks, disaster recovery and business continuity. Things have changed. Bad actors are all around us; unfortunately, disaster recovery is deceptively complex where Active Directory is concerned.

Hopefully, you won’t need it; however, in this piece from securitymagazine.com, author Jorge de Almeida Pinto lays out five essential tips and some thoughts on what establishes a solid Active Directory backup plan.

Read More

iPhone 14 Pro Max Vs. Samsung Galaxy S22 Ultra: Flagship Showdown

September 19th, 2022 Posted by Life and Culture, Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “iPhone 14 Pro Max Vs. Samsung Galaxy S22 Ultra: Flagship Showdown”

“Check out this excellent head-to-head and decide which heavyweight smartphone would be best in your corner!”

Glenn Baruck, The eDot Family of Companies


The battle royal continues between the two technology giants in the smartphone arena, Samsung and Apple. In this latest battle, Apple is gunning for Samsung’s flagship smartphone with the release of their top-of-the-line model, the iPhone 14 Pro Max.

Now, the question on everyone’s mind is, can Apple’s newest superstar take down what many consider the reigning heavyweight champion of smartphones, Samsung’s Galaxy S22 Ultra? As Snider notes in this article for crn.com, Apple had a lot of time to put its game plan into action as Samsung’s Galaxy S22 Ultra was announced back in February of this year when Samsung President TM Roh said the S22 Ultra was “the ultimate smartphone.”

Read More

Risk assessments in focus amid security challenges

September 13th, 2022 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Risk assessments in focus amid security challenges”

“IoT devices are amazing! Unfortunately, hackers also love them and look to them for a new way in.”

Glenn Baruck, Chicago Voice & Data


COVID-19, supply chain shortages and talent scarcities are just a few of the more immediate challenges business owners have had on their plate these last few years. These newer problems are in addition to the usual concerns that organizations face daily.

Therefore, business as usual has now become unusually complex. In many cases, these new complexities have distracted owners and management from addressing what were once” everyday issues” and left their risk assessment and planning practices la king at possibly the worst time.

Well, now may be a good time to assess your risks. Fortunately, Mike Zblewski has written an excellent column for Securitymagazine.com that reviews good risk assessment practices to help you get your organization back on track.

Read More

Apple iPhone 14, Watch Series 8 Launched At ‘Far Out’ Event

September 12th, 2022 Posted by Life and Culture, Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology, Uncategorized 0 thoughts on “Apple iPhone 14, Watch Series 8 Launched At ‘Far Out’ Event”

“Never one to rest on their laurels, Apple is out with the iPhone 14 and more to dazzle and make your life easier!”

Glenn Baruck, Chicago Voice & Data


In a “Far Out” event last week, Apple launched the highly anticipated iPhone 14, their new Series 8 Apple Watches and the first update to the AirPods Pro earbuds in three years!

Talk about excitement; at their biggest event of the year, Apple rolled out a lot of new tech for Apple product fans and potential new users. The updates to the new products announced is bound to make techies cheer with faster speeds, better sound, more features and durability and a greater focus on security leading the way. 

In this article, Shane Snider covers all the newest releases and provides the nitty gritty to help you get acquainted with the latest and greatest from this market innovator.

Read More

The urgency of cybersecurity for hardware devices

September 7th, 2022 Posted by Life and Culture, Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology, Uncategorized 0 thoughts on “The urgency of cybersecurity for hardware devices”

“IoT devices are amazing! Unfortunately, hackers also love them and look to them for a new way in.”

Glenn Baruck, Chicago Voice & Data


As if cybersecurity concerns for computers and computer networks were not enough, today, threat actors are becoming more advanced daily as they search for new vulnerabilities to exploit machine learning and AI tools within companies and organizations. Already targeting software and hardware gaps, these hackers have developed a new favorite, smart-enabled devices on the Internet of Things (IoT).

According to recent estimates, equipment connected to the internet is growing exponentially and will produce more than 30 billion IoT connections by 2025! That is a lot of connected devices to consider when addressing your company’s cybersecurity. In this piece by Chuck Brooks for Securityinfowatch.com, the author suggests several innovative solutions that may help you combat these growing threats to IoT devices in your organization.

Read More

Archives