Posts in Uncategorized

Chrome’s sidebar apps are the best new productivity feature no one’s talking about

September 5th, 2023 Posted by Life and Culture, Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology, Uncategorized 0 thoughts on “Chrome’s sidebar apps are the best new productivity feature no one’s talking about”

“Google Chrome’s sidebar may be the productivity tool you’ve been dreaming about!”

Glenn Baruck, The eDot Family of Companies

When it comes to digital tools for productivity, Google Chrome’s Sidebar Apps have emerged as a hidden gem that deserves more attention. While everyone is busy discussing the latest tech trends, Google’s innovative feature has quietly revolutionized how users interact with their web browsers. In this article by Jared Newman for fastcompany.com, Newman delves into the lesser-known but highly impactful aspect of Chrome, revealing why Sidebar Apps are the productivity booster you never knew you needed. Read the rest of the article to discover how this unassuming feature can streamline your online experience and enhance your daily workflow.

Read More

As Ransomware Gangs Shift To Data Extortion, Some Adopt A New Tactic: ‘Customer Service’

August 23rd, 2023 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology, Uncategorized 0 thoughts on “As Ransomware Gangs Shift To Data Extortion, Some Adopt A New Tactic: ‘Customer Service’”

“Not sure I’d trust a ransomware gang member to help secure my website!”

Glenn Baruck, The eDot Family of Companies

If you thought you’d seen and heard it all about ransomware attacks, think again! As the landscape of cyber threats continues to evolve, ransomware gangs are exhibiting a chilling transformation that’s taking extortion tactics to an alarming new level. Recently, as the focus of ransomware attacks has shifted from simple data encryption to outright data theft, an astonishing and unsettling trend has emerged. Some cybercriminal groups are embracing an unexpected approach: customer service.

In this article for crn.com, author and cybersecurity expert Kyle Alspach delves into this alarming trend, shedding light on how some ransomware factions are adopting a bizarre blend of criminality and professionalism to achieve higher success rates in their nefarious endeavors.

Read More

Microsoft Cloud Email Breach: 5 Things To Know

July 17th, 2023 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology, Uncategorized 0 thoughts on “Microsoft Cloud Email Breach: 5 Things To Know”

“Despite Microsoft’s recent focus on cybersecurity, their cloud email application was successfully compromised by hackers! Here is what you need to know.” 

Glenn Baruck, The eDot Family of Companies

As we witnessed last week, when it comes to cybersecurity, no organization is impervious to potential threats, as demonstrated by the recent Microsoft Cloud email breach.

In this article, Kyle Alspach of crn.com sheds light on the significant incident that impacted countless users. The breach exposed vulnerabilities within Microsoft’s cloud email service, compromising users’ sensitive information. Alspach’s article provides critical insight into the breach. It also delves into crucial takeaways, highlighting the implications of the breach and emphasizing the importance of robust security measures in today’s digital landscape.

Read More

Windows 11 Update Adds Bing AI Features

March 6th, 2023 Posted by Life and Culture, Small and Medium-Sized Businesses (SMBs), Technology, Uncategorized 0 thoughts on “Windows 11 Update Adds Bing AI Features”

“Windows 11 has already been a winner for Microsoft; now it is getting even better!”

Glenn Baruck, The eDot Family of Companies


Per Tyler Millward from crn.com, Windows 11 is getting smarter! According to Millward, Microsoft’s Windows 11 operating system just received updates making it more intelligent and making user’s life easier. One of the most exciting updates is the addition of an AI-powered version of its Bing search engine to the taskbar! Check out all of the details here in this recent article from crn.com.


Read More

5 Reasons why Faces are Superior Credentials

November 16th, 2022 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology, Uncategorized 0 thoughts on “5 Reasons why Faces are Superior Credentials”

“While often controversial, security experts tout the benefits of facial recognition for access control.”

Glenn Baruck, DigiTek Security


Most access control systems provide fairly ordinary identity validation at offices, factories, campuses, housing facilities, and similar venues. These venues require reliable and accurate identity, allowing users to proceed with minimal interruption while controlling costs.

Security professionals agree that MFA (multi-factor identification) is the safest approach. However, MFA is often excessive in these everyday scenarios, relying on cumbersome ID methods like a PIN code combined with a fingerprint and a keycard.

So, the question is, what method is best for most access control systems? In this article by Aluisio Figueiredo for securityinfowatch.com, the author looks at facial recognition as the best solution, even as it faces ongoing privacy concerns from those who are asked to use it.


Read More

3 ways to keep ahead of the physical impact of cyberattacks

October 12th, 2022 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology, Uncategorized 0 thoughts on “3 ways to keep ahead of the physical impact of cyberattacks”

“Cyberattacks can cripple your physical assets as easily as your virtual ones.”

Glenn Baruck, The eDot Family of Companies


Physical and cybersecurity are converging with attacks focused on or often affecting physical systems, assets, and infrastructure.  Successful breaches of physical assets can have a domino effect on your business or organization, leaving you dead in the water if you are unprepared.

This piece written by Matthew Bradley for securitymagazine.com provides a few critical tips to help keep your organization ahead of the physical impacts of a cyberattack.


Read More

Archives