Why chain of custody is essential for surveillance video

March 5th, 2020 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Why chain of custody is essential for surveillance video”

“If you are responsible for security, then you must take precautions to deploy the proper chain of command when handling your data to avoid liability issues.”

– Glenn Baruck, DigiTek Security


When it comes to security for your business, selecting, installing and maintaining quality premise base systems are a must. However, if you are responsible for the protection and safety of employees, the job does not end here. Systems can provide a plethora of data, but how you handle this information when an incident occurs is as or more important than collecting it. This article by Bill Brennan for Security Infowatch explains the impact of handling your surveillance data and how best to do so.

Learn More about DigiTek Security.

Scammers are trying to exploit coronavirus concerns to breach companies

March 2nd, 2020 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Scammers are trying to exploit coronavirus concerns to breach companies”

“As we have seen in the past, crises of all kinds will bring out the bad guys. Make sure your team is aware of this latest scam to avoid putting your data at risk.”

– Glenn Baruck, The eDot Family of Companies


Be alert, researchers from the email security firm Proofpoint recently discovered a series of phishing attempts aimed at businesses in sectors that are particularly vulnerable to a disruption in trade because of the coronavirus, such as manufacturing, transportation and finance. The messages feature subject lines like “Coronavirus – Brief note for the shipping industry,” then direct recipients to download a Microsoft Word document promising more information. Unfortunately, scammers of all sorts have historically worked to exploit attention and concerns on global crises, from natural disasters to sudden geopolitical events. Read more about this latest phishing scam in this article by Jeff Stone for cyberscoop.

Read more

Learn more about The eDot Family of Companies.

IT Management Best Practices To Protect Your Business From Data Breaches

February 27th, 2020 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “IT Management Best Practices To Protect Your Business From Data Breaches”

“Data breaches continue to haunt businesses of all sizes. Therefore, it is always a good time to brush up on best practices to help protect your company from a data breach.”

– Glenn Baruck, eDot


Look at recent history, and you will see that in the past five years, more than 14.7 billion records have been lost or stolen due to data breaches. In the business world, victims are companies, both large and small. Remarkably, according to reports, less than 5% of the data exposed in breaches over the past five years was encrypted. Couple this with the fact that almost every business handles sensitive or personally identifiable data and you will see why it is always a good time to look at best practices for protecting your business from a data breach.

This topical article posted by Matt Shealy on Smallbiztechnology.com provides an excellent overview of the current best practices for IT management to protect businesses from data breaches.

Read more

Learn more about eDot.

5 Time Management Strategies For Less Stressful Mornings

February 26th, 2020 Posted by Employment, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “5 Time Management Strategies For Less Stressful Mornings”

“Rush, rush, rush. Mornings can be stressful and throw a wrench into the rest of your day. Check out these time management tips; they may help your day go a lot smoother.”

– Glenn Baruck, The eDot Family of Companies


You know what it’s like. You hit snooze too many times; the dog would not go out for a walk, suddenly you are in a desperate rush to get out of the house on time. Moreover, this is before you face the challenge of your morning commute and opening your email!

Even if you are usually right on schedule, mornings that get off on the wrong foot can turn days into marathons. Well, there is hope and if you have three minutes to spare, this article by Elizabeth Grace Saunders for FastCompany may help you get off to a good start more often than not.

Read more

Learn more about The eDot Family of Companies.

Cyber-Insurance Rates Soaring Thanks to Rise in High-Cost Ransomware Attacks

February 5th, 2020 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Cyber-Insurance Rates Soaring Thanks to Rise in High-Cost Ransomware Attacks”

“Often, we are forced to accept the bad with the good. It looks like that is the case with ransom attacks and cyber-insurance rates.”

– Glenn Baruck, eDot


According to recent statistics, the number of ransom attacks was slightly down in 2019 compared to the previous year. That is a good thing. Unfortunately, the cost of these ransom attacks is increasing as hackers are now demanding higher payoffs and doing more damage to businesses and governments whom they successfully target. The result? Insurers have made “Dramatic” increases in premiums for cyber-insurance and are considering lowering the ransom amounts they will pay.

Check out this recent article by Haley Samsel for Securitytoday, for the inside story as you prepare to discuss cyber-insurance for your business.

Read more

Learn more about eDot.

Ring App for Android Full To the Brim with Third-Party Trackers: Report

January 30th, 2020 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Ring App for Android Full To the Brim with Third-Party Trackers: Report”

“Be careful; your smart devices may be outsmarting your efforts to secure your personal data.”

– Glenn Baruck, Chicago Voice & Data


You know that you are leaving digital breadcrumbs when you are on the internet and searching in your web browser but you might be surprised at some of the other places that are also receiving these critical bits of digital info.

Recently, the Electronic Frontier Foundation published the results of an investigation into the Android version of the Ring app (you know, the one that works with that hugely popular doorbell security camera?). According to the investigation, this Android app (version 3.21.1) reportedly includes a plethora of trackers sending out customer data to third parties. Following their investigation the digital rights group said Ring for Android version 3.21.1 is “Packed” with third-party trackers that collect customers’ personally identifiable information including names, private IP addresses, mobile network carriers, persistent identifiers – long-lasting references to digital objects – as well as sensor data. If you find this a bit discomforting, check out this short piece by Charlie Osborne for Zero Day for more info.

Learn More about Chicago Voice & Data.

Archives