9 Benefits Of Risk Assessment For Facilities

May 11th, 2022 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “9 Benefits Of Risk Assessment For Facilities”

“As we move forward, facility risk assessment needs to shift from user-health to external and internal threat evaluation.”

Glenn Baruck, The eDot Family of Companies


With facilities around the country reopening and crime rising, building and facility managers need to shift their focus from a pandemic user-health approach to evaluating a facility’s defenses against internal and external threats.

In this article from Jonathan Tal and facilityexecutive.com, the security risk assessment expert outlines the 9 benefits of risk assessment for facilities in this ever-changing environment.


Read More

Meeting the moment for hybrid work cybersecurity

May 5th, 2022 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Meeting the moment for hybrid work cybersecurity”

“Your IT Security team should not go alone in today’s distributed, multi-cloud environment.”

Glenn Baruck, Chicago Voice & Data


Hybrid and remote work scenarios combined with the ongoing increase in cyberattacks continue to push security professionals and resources to their limits. The reality taking hold is that most IT security pros need help in implementing a more holistic approach to their organization’s security and require assistance from AI and outside partners.

This article composed by Rich Korn for securitymagazine.com takes a closer look at the current journey for security professionals. In addition, Korn provides guidance for getting your security staff the help they need to keep your business protected in this new environment.


Read More

Cyber Insurance Tips To Help IT Leaders Be Ready For ‘Game Day’

May 4th, 2022 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Cyber Insurance Tips To Help IT Leaders Be Ready For ‘Game Day’”

“Are you and your IT leadership ready for ‘Game Day’?”

Glenn Baruck, The eDot Family of Companies


Cyber insurance is necessary for most organizations in today’s hostile digital environment. The good news is that many business and IT leaders are well aware of this reality, purchased a policy and have the peace of mind that it is in place. However, having a cyber insurance policy is only a part of the game-time preparation needed In what some experts say will be the worst 72 hours of IT leaders’ lives. When a cyber incident happens, IT leaders will be relied upon to put their cyber insurance policies into action, and without some of these insights, things can get scary.

This piece by C.J. Fairfield for crn.com delivers three critical tips for IT and business leaders to prepare for if and when they have to put their cyber insurance policies into action!


Read More

42 Mother’s Day Tech Gifts They’ll Actually Use

May 2nd, 2022 Posted by Life and Culture, Technology 0 thoughts on “42 Mother’s Day Tech Gifts They’ll Actually Use”

“If you’re looking for unique Mother’s Day gifts to relate to her inner techie, check out these awesome ideas!”

Glenn Baruck, The eDot Family of Companies


If the mom in your life is like millions of other mothers today, she is likely tired of the stereotypical Mom’s Day gifts. And believe it or not, your special wife or mom may be more of a techie than you realize!

These past pandemic years have changed how we interact with technology, and moms are at the forefront of this paradigm shift. If you are still shopping for that perfect gift, have no fear, this list of tech gifts from Kit Stone, Allison Jiang and Clara McMahon for buzzfeed.com contains mom-friendly gadgets that she will actually put to good use, and you might like them too!


Read More

Return to the Office: How Access Control Can Help

April 26th, 2022 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Return to the Office: How Access Control Can Help”

“The office may have changed forever. Here are some excellent insights on keeping your employees more secure

Glenn Baruck, DigiTek Security


The pandemic has changed numerous aspects of what many businesses and organizations formerly considered “normal.” With these recent changes and the pandemic slowing but still with us, we can anticipate that many things “at the office” will not go back to how they were pre-COVID-19.

This “new normal” scenario is particularly true for building management, especially in commercial spaces. An August 2021 survey of more than 750 business executives by PwC found that about one-third of companies are planning to have a hybrid work model, indicating the size and use of office spaces may decrease.

This highly informative piece by Angelo Faenza for securityinfowatch.com contains a ton of helpful insight into how you should be thinking about your space and what you can do to ensure the health and safety of your team as they return to the office full-time or in a hybrid scenario.


Read More

Learn more about The eDot Family of Companies

Checkmarx: Attackers Hijacking GitHub Ratings To ‘Infect As Many Targets As Possible’

April 25th, 2022 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Checkmarx: Attackers Hijacking GitHub Ratings To ‘Infect As Many Targets As Possible’”

“Beware, “Starjacking” is real and can lead software developers down a dangerous and slippery slope!”

Glenn Baruck, The eDot Family of Companies


GitHub is an online software development platform used for storing, tracking, and collaborating on software projects. It has become the world’s largest coding community where independent and commercial computer software developers go for research and connections to open source code to develop new software and other computer programs.

Alarmingly, cybersecurity company Checkmarx recently revealed that it has discovered that hackers can effectively hijack GitHub’s star ratings of open-source products to trick developers into downloading malicious code.

In this article by Jay Fitzgerald for crn.com, the author discusses this discovery and its dangers.


Read More

Learn more about The eDot Family of Companies

Archives