Posts by chicagovoiceanddata

How QR codes work—and what makes them dangerous

April 13th, 2022 Posted by Life and Culture, Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “How QR codes work—and what makes them dangerous”

“The resurgence of the QR code is at once a blessing and potentially a curse.”

Glenn Baruck, The eDot Family of Companies


Once somewhat underutilized, the pandemic brought renewed interest in and the widespread use of QR codes. The big attraction in the revival of QR codes is their ability to help people avoid physical contact with objects previously handled by thousands, like restaurant menus, pens for email list sign-ups, appointment check-ins, etc. As innocent and convenient as they may seem, QR codes can be dangerous if deployed by bad actors with criminal intentions.

Learn about the QR code’s makeup and potential dangers in this brief piece by Scott Ruoti for fastcompany.com.


Read More

Learn more about Chicago Voice & Data

7 Major Cybersecurity Risks For Midsize Organizations: Gartner

March 31st, 2022 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “7 Major Cybersecurity Risks For Midsize Organizations: Gartner”

“Cybersecurity risks in 2022 are growing again, and midsize companies are prime targets for the bad guys. Know the top risks and be better prepared.”

Glenn Baruck, eDot


2021 was a hectic year for cybersecurity experts and IT professionals as organizations in the US and globally confronted a record number of cyberattacks. Statistics report that 2021 businesses observed 50% more attacks per week in 2021 compared to 2020. This alarming increase in the number of attacks was accompanied by a 10% year-over-year increase in the average cost of a data breach. According to expert predictions, 2022 does not look any better. Organizations and businesses of all sizes were affected in 2021, and this trend will continue in 2022.  

In this piece for crn.com, author Michael Novinson reveals the 7 major cybersecurity risks for midsize organizations and provides concise insight on each of them.


Read More

Learn more about Chicago Voice & Data

Three things to consider in your hybrid office security checklist

December 6th, 2021 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Three things to consider in your hybrid office security checklist”

“As we approach 2022, hybrid work scenarios are more prevalent. Security pros and business leaders responsible for planning can benefit from this checklist!”

Glenn Baruck, The eDot Family of Companies


With 2022 just on the horizon, businesses and leadership have a lot to plan for in the upcoming year. As the pandemic continues to take us on a roller coaster ride, organizations continue t face decisions on how the future of their workplaces will look, both in the short and long term. One direction many companies are taking is moving to a hybrid work landscape. With this move comes a new set of security challenges, especially when it comes to data security and the security of your employee’s personal information.

In this article from securityinfowatch.com, author Mike Betsko provides us with excellent insight into three critical things to consider when making your hybrid security checklist.


Read More

Learn more about Chicago Voice & Data

The basics of fending off ransomware attacks

October 20th, 2021 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “The basics of fending off ransomware attacks”

“Ransomware attacks are increasing and evolving. For the sake of your organization, learn, implement and update your strategy before you become a victim.”

Glenn Baruck, The eDot Family of Companies


Ransomware has been an ongoing menace for business and government organizations for nearly ten years. It has become one of the most profitable and popular business models for criminal organizations. As it matures, experts predict ransomware will become an even more significant and sinister threat as attacks become more common, sophisticated and potentially expensive for victims.

In light of these predictions, many businesses and organizations may need to revisit their cybersecurity practices, even those who have avoided or successfully fended off attacks.

This article by Mike Loukides for securityinfowatch.com provides insight on the future direction of the threat and a practical outline for fending off ransomware attacks.


Read More

Learn more about Chicago Voice & Data

The Upside Down: Inside the Dark Web

October 5th, 2021 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “The Upside Down: Inside the Dark Web”

“The dark web is a mysterious and frightening place to many of us. This article can help you understand it better and keep your information from ending up there!”

Glenn Baruck, Chicago Voice & Data


For most average internet users, what we see and utilize on the web is only a minute segment of what exists. We all have heard the term “The Dark Web.” Yet, most casual internet users have no idea what that term means and what information is out there on the dark web.

In this short but informative article, Jay Ryerse of Connectwise.com breaks down the different web layers and provides an excellent overview of what exists on the dark web, how you can protect your information from getting there and how to see if it already has.


Read More

Learn more about Chicago Voice & Data

Strategies to Help Protect Your Digital Footprint

September 30th, 2021 Posted by Life and Culture, Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Strategies to Help Protect Your Digital Footprint”

“Digital footprints, almost everyone has one; the question is how do you protect it from the bad guys?”

Glenn Baruck, Chicago Voice & Data


Like it or not, you have a digital footprint. It’s unavoidable; you create a digital footprint if you access the internet from a computer, tablet, smartphone, or just about any smart device.

So, what exactly is a digital footprint? Is a digital footprint good or bad? How do you protect your digital footprint from being misused? These are all relevant questions, and fortunately for us, they are the focus of this excellent piece from Morganstanley.com.


Read More

Learn more about Chicago Voice & Data

Archives