Posts in Small and Medium-Sized Businesses (SMBs)

Seven basic security tips to aid business emergency planning

May 10th, 2021 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Seven basic security tips to aid business emergency planning”

“You never know when you will need a solid emergency plan. Creating even a basic outline is an excellent place to begin!”

Glenn Baruck, DigiTek


Developing and maintaining an emergency business plan is often looked upon by business owners as a chore to be put off rather than a critical element essential to the organization’s long-term survival. To ensure that you cover all of the bases, lean on security professionals who know the importance of protecting against online and physical attacks to lead in the planning process and during times of crisis.

This article By Devin Partida for Securityinfowatch.com provides 7 fundamental security tips to help in creating your emergency plan and is worth re-visiting from time to time.   


Read More

Learn more about Chicago Voice & Data

Ransomware gangs get more aggressive against law enforcement

May 10th, 2021 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Ransomware gangs get more aggressive against law enforcement”

“If they’re willing to attack Police departments, you can be sure that these hackers are not afraid to hold almost any organization hostage for ransom payments!”

Glenn Baruck, DigiTek


Ransomware attacks continue to proliferate the digital landscape in 2021, with experts predicting no end in sight to this growing trend. One of the more shocking realities is that these cyber criminals seem to be unintimidated, even targeting Police departments large and small! Recently, these hackers have become even more aggressive, threatening to and leaking confidential information, including informants’ identities, unless an unspecified ransom was paid. This article By Alan Suderman for APnews.com provides a look into recent attacks and the expanded information collected by Police departments at risk of being exposed.   


Read More

Learn more about Chicago Voice & Data

Social engineering cyberattacks and how they’re impacting businesses

May 5th, 2021 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Social engineering cyberattacks and how they’re impacting businesses”

“Social engineering cyberattacks target your organization’s weakest link, you and your people!”

Glenn Baruck, eDot


Criminals seeking a profitable income stream continue to gravitate towards cyberattacks as one of their preferred sources of income. Experts anticipate global cybercrime costs to skyrocket to $10.5 trillion annually by 2025. In response to this constantly rising threat, organizations are increasing digital defenses to protect against traditional cyberattack methods. At the same time, cybercriminals are adopting a new strategy, side-stepping conventional defenses, and targeting businesses’ most vulnerable assets, the ones that software can’t fully protect — people. This new trend is known as “Social Engineering Attacks.” If you are not familiar with or would like to learn more about these attacks, check out this outstanding article by Author Devin Partida for Securityinfowatch.com. In the article, Devin provides an excellent overview of this trend and valuable insights on identifying and defending against them.


Read More

Learn more about Chicago Voice & Data

Mailroom security considerations: Best practices and procedures

April 28th, 2021 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs) 0 thoughts on “Mailroom security considerations: Best practices and procedures”

“Don’t forget the security of your mailroom in your risk assessment, security planning and policies!”

Glenn Baruck, eDot


Often overlooked, mailroom security is a critical component in the process of keeping your facility, team members and organization safe.  While email remains dominant and warrants ongoing training and procedures to prevent a data breach, mailrooms are still relevant and present a potential security gap. In this article from Securityinfowatch.com, author Brian W. Lynch provides excellent insight and valuable guidelines for upping your mailroom security in commercial and residential settings.


Read More

Learn more about Chicago Voice & Data

You can now run Windows 10 on Arm on Apple’s M1 Macs

April 19th, 2021 Posted by Life and Culture, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “You can now run Windows 10 on Arm on Apple’s M1 Macs”

“If you’re an Apple fan, but like Windows 10, you can now enjoy the best of both worlds!”

Glenn Baruck, The eDot Family of Companies


For those of you who are Apple fans but also like Windows 10, you’re in luck! According to this recent article by Tom Warren for The Verge, a virtual machine software company has just launched software that allows M1 Mac owners to install and run Windows 10 on their machines. From what I can tell, it’s not perfect but pretty darn close to the nirvana of having your cake and eating it too!


Read More

Learn more about Chicago Voice & Data

Strategic Steps for Creating a Safe “Return to Work” Environment

April 15th, 2021 Posted by Employment, Life and Culture, Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Strategic Steps for Creating a Safe “Return to Work” Environment”

“Safe access control is a critical piece for inspiring employee confidence as you plan a safe return to work.”

Glenn Baruck, The eDot Family of Companies


As we progress in our battle with COVID-19 and learn more about living with the virus, returning to work in some form is top of mind for many organizations. What returning to work will look like remains to be seen and will likely vary by company and team. One of the critical areas to consider in planning your return is assessing top access control and entry risks and corresponding mitigation strategies. Legacy access control systems probably need upgrading to address the new normal challenges that a safe return requires. Frank Pisciotta’s article for Securityinfowatch.com does an excellent job of outlining 8 post-COVID-19 world threats associated with legacy access control and entry practices and solutions to address them.   


Read More

Learn more about Chicago Voice & Data

Archives