Mobile Attacks Outpace Desktop Assaults

March 9th, 2020 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Mobile Attacks Outpace Desktop Assaults”

“It was only a matter of time. Now your smartphone is an as big or bigger target for hackers than your desktop/laptop.”

– Glenn Baruck, Chicago Voice & Data


We knew it was coming, but it happened a little faster than we expected. Researchers have now made it official; according to statistics from the latest LexisNexis Risk Solutions cybercrime report, “Fraud Without Borders.” more cyber-attacks have been waged against mobile devices than have been hurled at desktops.

There is a lot more to the story and this article by Sarah Coble for infosecurity magazine covers the highlights of the report, which looked at 19 billion transactions that took place on LexisNexis’ Digital Identity Network between July and December last year. It’s a brave new world out there and our information is under attack on all fronts.

Learn More about Chicago Voice & Data.

Why chain of custody is essential for surveillance video

March 5th, 2020 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Why chain of custody is essential for surveillance video”

“If you are responsible for security, then you must take precautions to deploy the proper chain of command when handling your data to avoid liability issues.”

– Glenn Baruck, DigiTek Security


When it comes to security for your business, selecting, installing and maintaining quality premise base systems are a must. However, if you are responsible for the protection and safety of employees, the job does not end here. Systems can provide a plethora of data, but how you handle this information when an incident occurs is as or more important than collecting it. This article by Bill Brennan for Security Infowatch explains the impact of handling your surveillance data and how best to do so.

Learn More about DigiTek Security.

Scammers are trying to exploit coronavirus concerns to breach companies

March 2nd, 2020 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Scammers are trying to exploit coronavirus concerns to breach companies”

“As we have seen in the past, crises of all kinds will bring out the bad guys. Make sure your team is aware of this latest scam to avoid putting your data at risk.”

– Glenn Baruck, The eDot Family of Companies


Be alert, researchers from the email security firm Proofpoint recently discovered a series of phishing attempts aimed at businesses in sectors that are particularly vulnerable to a disruption in trade because of the coronavirus, such as manufacturing, transportation and finance. The messages feature subject lines like “Coronavirus – Brief note for the shipping industry,” then direct recipients to download a Microsoft Word document promising more information. Unfortunately, scammers of all sorts have historically worked to exploit attention and concerns on global crises, from natural disasters to sudden geopolitical events. Read more about this latest phishing scam in this article by Jeff Stone for cyberscoop.

Read more

Learn more about The eDot Family of Companies.

IT Management Best Practices To Protect Your Business From Data Breaches

February 27th, 2020 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “IT Management Best Practices To Protect Your Business From Data Breaches”

“Data breaches continue to haunt businesses of all sizes. Therefore, it is always a good time to brush up on best practices to help protect your company from a data breach.”

– Glenn Baruck, eDot


Look at recent history, and you will see that in the past five years, more than 14.7 billion records have been lost or stolen due to data breaches. In the business world, victims are companies, both large and small. Remarkably, according to reports, less than 5% of the data exposed in breaches over the past five years was encrypted. Couple this with the fact that almost every business handles sensitive or personally identifiable data and you will see why it is always a good time to look at best practices for protecting your business from a data breach.

This topical article posted by Matt Shealy on Smallbiztechnology.com provides an excellent overview of the current best practices for IT management to protect businesses from data breaches.

Read more

Learn more about eDot.

5 Time Management Strategies For Less Stressful Mornings

February 26th, 2020 Posted by Employment, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “5 Time Management Strategies For Less Stressful Mornings”

“Rush, rush, rush. Mornings can be stressful and throw a wrench into the rest of your day. Check out these time management tips; they may help your day go a lot smoother.”

– Glenn Baruck, The eDot Family of Companies


You know what it’s like. You hit snooze too many times; the dog would not go out for a walk, suddenly you are in a desperate rush to get out of the house on time. Moreover, this is before you face the challenge of your morning commute and opening your email!

Even if you are usually right on schedule, mornings that get off on the wrong foot can turn days into marathons. Well, there is hope and if you have three minutes to spare, this article by Elizabeth Grace Saunders for FastCompany may help you get off to a good start more often than not.

Read more

Learn more about The eDot Family of Companies.

Cyber-Insurance Rates Soaring Thanks to Rise in High-Cost Ransomware Attacks

February 5th, 2020 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Cyber-Insurance Rates Soaring Thanks to Rise in High-Cost Ransomware Attacks”

“Often, we are forced to accept the bad with the good. It looks like that is the case with ransom attacks and cyber-insurance rates.”

– Glenn Baruck, eDot


According to recent statistics, the number of ransom attacks was slightly down in 2019 compared to the previous year. That is a good thing. Unfortunately, the cost of these ransom attacks is increasing as hackers are now demanding higher payoffs and doing more damage to businesses and governments whom they successfully target. The result? Insurers have made “Dramatic” increases in premiums for cyber-insurance and are considering lowering the ransom amounts they will pay.

Check out this recent article by Haley Samsel for Securitytoday, for the inside story as you prepare to discuss cyber-insurance for your business.

Read more

Learn more about eDot.

Archives