Posts in Technology

The Ultimate Guide: Buying a Computer for School

August 9th, 2019 Posted by Technology 0 thoughts on “The Ultimate Guide: Buying a Computer for School”

“Technology continues to grow in our student’s educational experience. Selecting the right computer will help make that experience more rewarding.”

– Glenn Baruck, Chicago Voice & Data


School is in, and it may be time to upgrade your student’s technology. Today, computers play a critical role in almost every student’s educational experience as they rely on them for research, communication, and often for multi-media presentations as well. The importance of these activities makes selecting the right computer for your student essential to enhancing their educational experience and maximizing their success.

There is more to the decision-making process than meets the eye, and choosing the right solution can often be daunting. This article by Mark Kyrnin for Lifewire provides an excellent roadmap to selecting the right computer with the best features for your student, whether for use at home or away.

Learn More about Chicago Voice & Data.

Guidelines for Setting Camera Field of View

August 8th, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Guidelines for Setting Camera Field of View”

“While it may seem simple, setting up a security camera’s field of view is critical to its overall effectiveness in protecting your business or home.”

– Glenn Baruck, DigiTek Security


Security cameras are a useful tool in protecting your business or home; however, setting them up correctly significantly affects their usefulness. One important aspect of setting up a security camera is its field of view. Getting the proper field of view for your specific application takes a bit of skill and some patience as well. Forget about the rules you follow when taking a photo or recording video for entertainment purposes and remember what you need these cameras to “see.”

This article by ERIC OLSON for Security Infowatch provides you with some critical guidelines that will help ensure that you get your cameras set up correctly to see the whole picture.

Learn More about DigiTek Security.

How To Avoid The Most Common School Security Design Mistakes

August 8th, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “How To Avoid The Most Common School Security Design Mistakes”

“If you are responsible for or concerned with physical security in your school or facility, this article, and related webinars could help you avoid critical mistakes.”

– Glenn Baruck, DigiTek Security


Having good security equipment is only part of the equation, as pointed out in this article by Ray Bernard for SECURITYINFOWATCH. Shortcutting proper security design in the rush to “do something” can have devastating consequences for educational and other types of facilities. According to Bernard, there is a typical security design mistake that occurs in many types of facilities, but the impact of it can be significantly higher on schools, whose incident response requirements are greater than many other organizations.

Check out this valuable article and the links to related webinars to learn more about the most common security mistakes. While much of what is covered is common knowledge among trained and experienced security design consultants, security practitioners and others responsible for facility physical security risk management it may be helpful to you when implementing a new system or updating your current one.

Learn More about DigiTek Security.

The Rise Of Insider Threats: Key Trends To Watch

July 16th, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “The Rise Of Insider Threats: Key Trends To Watch”

“Internal cyber attacks are on the rise and must be taken seriously. How do organizations prevent them? Get the latest insights here from TechBeacon.”

– Glenn Baruck, eDot


When it comes to security threats, companies have to prepare for a variety of issues. Insider cybersecurity threats have always been a concern but are becoming more prevalent as systems continue to be more interconnected. In a recent study conducted by Cybersecurity, Insiders showed that 53% of the organizations experienced an insider attack themselves. As these numbers continue to grow, 64% of organizations surveyed said they are now putting their focus on detecting insider threats and preventing attacks from happening. Also, 86% already have or are working on creating a program to prevent insider attacks.

There are many new developments in this fast-paced area, and keeping up with the latest best practices can be a challenge. This recent article by Yuri Martsinovsky for TechBeacon gives a good overview of what is happening and touches on some of the latest preventative measures companies are employing.

Read more

Learn more about eDot.

The Dangers Of Breach Fatigue-And How To Take Action

July 11th, 2019 Posted by Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “The Dangers Of Breach Fatigue-And How To Take Action”

“Data breaches are costly! However, you can do more to prevent them by combating breach fatigue within your organization.”

– Glenn Baruck, eDot


Fact: According to the Privacy Rights Clearinghouse, 9,033 data breaches have been made public since 2005, or about 1.77 breaches a day, on average. In light of these staggering numbers, experts say that breach fatigue is now common amongst consumers. Also, what we are now learning is that the breach fatigue also exists within organizations as well, and it presents a significant problem.

One of the significant dangers of breach fatigue is complacency, both in individual employees and within organizations as a whole. So how can business and technology leaders combat the risks of breach fatigue within their employees and broader processes? Learn about how you can take action against organizational breach fatigue and in this recent article written by Jadee Hanson, for TechBeacon.

Read more

Learn more about eDot.

When Your Apps Are Dormant, You Become A More Likely Target For Crooks

June 20th, 2019 Posted by Security & Surveillance, Technology 0 thoughts on “When Your Apps Are Dormant, You Become A More Likely Target For Crooks”

“Don’t forget about those dormant apps on your devices! They are a gateway to thieves looking to steal your information and more.”

– Glenn Baruck, Chicago Voice & Data


You know those banking and e-commerce apps you haven’t opened in months? It might be a good time to check-in with them and make sure no one else is using them either. According to forthcoming research from DataVisor, a California-based startup specializing in fraud detection, sixty-five percent of accounts that experience an account takeover attack – when an outsider logs in with a victim’s own username and password – have not been accessed by their true owner in more than 90 days.

Don’t be fooled by the 90 statistics; data also showed that while 65 percent of the affected accounts hadn’t been accessed in 90 days, 80 percent belonged to users who hadn’t logged in to their page in more than 30 days.

These fraudsters are very sophisticated and target dormant social media account information as well. Check out the 411 in this article by Jeff Stone for cyberscoop.

Learn More about Chicago Voice & Data.

Archives