Posts in Uncategorized

Hackers impersonating hotels on Booking.com launch aggressive phishing campaign

January 17th, 2024 Posted by Life and Culture, Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology, Uncategorized 0 thoughts on “Hackers impersonating hotels on Booking.com launch aggressive phishing campaign”

“Planning work or personal travel? Before you give out your information, beware of this new phishing campaign!”

Glenn Baruck, Chicago Voice and Data

It’s peak travel season, and in an alarming revelation, cybersecurity experts have uncovered a sophisticated phishing campaign targeting users of the popular travel platform Booking.com. According to reports, hackers are employing a clever tactic by impersonating hotels on the website, luring unsuspecting travelers into a web of deceit. This aggressive cyber-attack raises serious concerns about the security of personal information and payment details for those planning their accommodations online. As the sophistication of hackers increases, robust cybersecurity measures become more imperative than ever to safeguard users from such malicious endeavors.

Read More

Why are Voice Fraud Threats a Danger to Your Enterprise?

February 23rd, 2023 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology, Uncategorized 0 thoughts on “Why are Voice Fraud Threats a Danger to Your Enterprise?

“Remember, fraud threats are not only computer related. Voice fraud is a growing threat to organizations!”

Glenn Baruck, The eDot Family of Companies

Organizational threats can come from many places. The most significant recent concerns have centered around computer network integrity, ransomware and data breaches. Well, that is changing now as voice fraud is becoming more popular and could cause more damage than you realize to your organization.

In this article written for spiceworks.com, Dan Teichman, the director of solutions marketing at Ribbon, talks about what voice fraud is, the various types of it, and how organizations can protect themselves from this growing threat.

Read More

Look Out for These 3 Red Flags Before Downloading an App

January 23rd, 2023 Posted by Life and Culture, Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Uncategorized 0 thoughts on “Look Out for These 3 Red Flags Before Downloading an App”

“Anytime you’re considering downloading that shiny new app, take a minute or two to look for some easily spotted warning signs.”

Glenn Baruck, The eDot Family of Companies


According to recent research, if you are like most of us, you rarely read the service terms or the privacy policies of apps you download on your smartphone. Well, that can be a terrible idea any time of the year and could result in you agreeing to something you don’t realize, including giving your firstborn children to an imaginary company (no, really). In this informative piece for cnet.com, author Shelby Brown provides some valuable suggestions on what to look for BEFORE downloading that app that looks really cool.

Read More

Apple iPhone 14, Watch Series 8 Launched At ‘Far Out’ Event

September 12th, 2022 Posted by Life and Culture, Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology, Uncategorized 0 thoughts on “Apple iPhone 14, Watch Series 8 Launched At ‘Far Out’ Event”

“Never one to rest on their laurels, Apple is out with the iPhone 14 and more to dazzle and make your life easier!”

Glenn Baruck, Chicago Voice & Data


In a “Far Out” event last week, Apple launched the highly anticipated iPhone 14, their new Series 8 Apple Watches and the first update to the AirPods Pro earbuds in three years!

Talk about excitement; at their biggest event of the year, Apple rolled out a lot of new tech for Apple product fans and potential new users. The updates to the new products announced is bound to make techies cheer with faster speeds, better sound, more features and durability and a greater focus on security leading the way. 

In this article, Shane Snider covers all the newest releases and provides the nitty gritty to help you get acquainted with the latest and greatest from this market innovator.

Read More

The urgency of cybersecurity for hardware devices

September 7th, 2022 Posted by Life and Culture, Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology, Uncategorized 0 thoughts on “The urgency of cybersecurity for hardware devices”

“IoT devices are amazing! Unfortunately, hackers also love them and look to them for a new way in.”

Glenn Baruck, Chicago Voice & Data


As if cybersecurity concerns for computers and computer networks were not enough, today, threat actors are becoming more advanced daily as they search for new vulnerabilities to exploit machine learning and AI tools within companies and organizations. Already targeting software and hardware gaps, these hackers have developed a new favorite, smart-enabled devices on the Internet of Things (IoT).

According to recent estimates, equipment connected to the internet is growing exponentially and will produce more than 30 billion IoT connections by 2025! That is a lot of connected devices to consider when addressing your company’s cybersecurity. In this piece by Chuck Brooks for Securityinfowatch.com, the author suggests several innovative solutions that may help you combat these growing threats to IoT devices in your organization.

Read More

Can multi-factor authentication save us from password-based attacks?

November 9th, 2020 Posted by Life and Culture, Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology, Uncategorized 0 thoughts on “Can multi-factor authentication save us from password-based attacks?”

While cybercrime continues to explode, one thing hasn’t changed. According to the experts, we are still pretty lame in creating our passwords.”

Glenn Baruck, DigiTek


Check your favorite news source, and you will see it’s still happening at an alarming rate. Cybercriminals are everywhere and looking for their next victim. Large corporations, SMBs, personal accounts and organizations of all types are in their crosshairs. Many times, the only thing standing in their way are the passwords we create. Our password creation skills are where some of the most significant concern lies as experts try to figure out the best ways to protect ourselves, our customers and assets. Looking at the current state of passwords is seems that most of us need something to prevent our worst instincts when it comes to choosing passwords: using personal information, predictable keystroke patterns, password variations, well-known substitutions, single words from a dictionary, and – above all – reusing the same password for many different private and enterprise accounts. Shifting our focus into the future, especially for organizations, we need to figure out what an effective, modern password policy looks like. This article, written by Sam Bocetta for SECURITYINFOWATCH.com, covers the topic well and provides some practical help to boot.

Read more

Learn more about eDot

Archives