8776363957
Connect with us:
LinkedIn link
Facebook link
Twitter link
YouTube link
Gigabit Systems logo
Link to home
Who We AreManaged ServicesCybersecurityOur ProcessContact UsPartners
The Latest News in IT and Cybersecurity

News

A cloud made of diagonal linesA cloud made of diagonal lines
A pattern of hexagons to resemble a network.
Mobile-Arena
Cybersecurity
Tips
Technology

Why Is Outlook Search So Bad Lately? Here’s the Fix

September 1, 2025
•
20 min read

Why Is Outlook Search So Bad Lately? Here’s the Fix.

Several clients have recently reached out with the same frustration:

They search for an email in the Outlook mobile app—from someone they email daily—and it just doesn’t appear. Sometimes entire months of email history vanish while scrolling.

If you’ve experienced this, you’re not alone. This isn’t just a random glitch—it’s a known Outlook limitation that impacts far more users than Microsoft openly admits.

🔍 What’s Going On?

1. Outlook Mobile Has a Limited Sync Window

By default, the app only syncs a few weeks of email. Anything older simply won’t show unless you change the settings.

2. Local Search ≠ Full Search

Most searches only scan the email cached on your phone—not your full inbox in the cloud.

3. App Cache Corruption

Indexing occasionally breaks, especially on Android. When this happens, searches miss entire message ranges.

4. Microsoft Acknowledged Glitches

We’ve tracked service health notices where Microsoft confirmed widespread Outlook search problems.

🛠️ Quick Fixes

✔️ Change Sync Settings

Settings → Mail Account → Sync Settings → Choose All Time

✔️ Clear Cache / Reinstall App

(Android) Settings → Apps → Outlook → Clear Cache

✔️ Use Outlook on Web or Desktop

Search from Outlook on the web for full history and attachments.

✔️ Tap “See All Results”

Don’t rely only on “Top Results.” Expand to see the complete list.

🚨 Why This Matters for Business

Lost time searching for emails = lost productivity. For SMBs, law firms, schools, and healthcare organizations, missed emails can also mean:

  • Compliance issues

  • Delayed client responses

  • Security risks if users resort to insecure workarounds

The Bottom Line

Outlook search on mobile isn’t broken—it’s limited.

The fixes are simple, but many teams don’t realize these settings exist.

We’ve helped businesses solve this exact problem, and the relief is instant: faster searches, less frustration, and no more missing emails.

If your team is losing time digging for emails, reach out. A few adjustments can transform how your organization uses Outlook.

70% of all cyber attacks target small businesses. I can help protect yours.

#Outlook #Productivity #MSP #SmallBusinessIT #EmailManagement

Technology
AI
Cybersecurity
Must-Read

From Stadium Caps to Jumbotron Hugs — When Public Becomes Personal

September 1, 2025
•
20 min read

From Stadium Caps to Jumbotron Hugs — When Public Becomes Personal

Two viral moments made me pause:

At the US Open, a CEO grabbed a signed cap meant for a child.

At a Coldplay concert, another CEO hugged a colleague on the Jumbotron.

Both lasted seconds. Both triggered outrage. One lost a reputation. The other lost a job.

Technology doesn’t wait for context—it watches, records, and shares.

  • A hat snatch becomes a moral referendum.

  • A hug becomes a scandal.

Here’s the bigger question:

👉 Are we losing the ability to give people space—physically, emotionally, and digitally?

  • We zoom in without context.

  • We scroll past nuance.

  • We reduce people to their most viral 5 seconds.

I’m not excusing bad judgment. But I am reminding myself that every human is more than their lowest-resolution moment.

In a world where everything is visible, let’s not forget to see each other’s complexity. Let’s leave space for mistakes—and for dignity in recovery.

#Leadership #Empathy #Boundaries #PublicLife #TechAndHumanity #PersonalSpace

Technology
Cybersecurity
News

MRI Scans, X-Rays, and Patient Data Leaked in Major Breach

September 1, 2025
•
20 min read

MRI Scans, X-Rays, and Patient Data Leaked in Major Breach

Over a million healthcare devices misconfigured — exposing sensitive medical data worldwide

Researchers have discovered more than 1.2 million internet-connected healthcare devices leaking data due to weak or non-existent security protections.

The exposed data includes:

  • MRI scans and brain images

  • X-rays and bloodwork files

  • Personally identifiable information (PII), including names and contact details

How the Breach Happened

The issue stems from misconfigured devices and systems without proper passwords. Some were wide open, while others used weak, easily guessed credentials.

This leaves patient data not only exposed but also easily accessible to attackers, raising serious risks:

  • Identity theft

  • Wire fraud

  • Phishing attacks posing as doctors or hospitals

  • Blackmail over confidential conditions

In some cases, researchers warned that attackers could learn of a medical diagnosis before the patient themselves — creating opportunities for ransom and extortion.

Where It’s Happening

The majority of misconfigured devices were found in:

  • United States (174,000+)

  • South Africa (172,000+)

  • Australia (111,000+)

  • Brazil (82,000+)

  • Germany (81,000+)

Why This Matters for Healthcare and Beyond

Healthcare organizations face some of the highest stakes in cybersecurity. A single exposed medical image or health record can lead to:

  • HIPAA or GDPR violations

  • Loss of patient trust

  • Severe financial penalties

But the lesson isn’t limited to healthcare. Any organization that uses internet-connected devices (IoT) — from law firms to schools — risks the same exposure if assets aren’t configured and monitored correctly.

What Needs to Be Done

✔️ Comprehensive asset visibility — Know every device connected to your network

✔️ Stronger password policies — Eliminate default and weak credentials

✔️ Vulnerability management — Patch and harden all connected systems

✔️ Proactive monitoring — Detect leaks before attackers do

As Health-ISAC’s Chief Security Officer Errol Weiss noted:

“A proactive security culture beats a reactive response.”

70% of all cyber attacks target small businesses. I can help protect yours.

#CyberSecurity #HealthcareIT #DataBreach #IoTSecurity #MSP

Mobile-Arena
Cybersecurity
Tips
Technology

Zero-Click Exploit Hits WhatsApp Users on iOS and macOS

August 31, 2025
•
20 min read

Zero-Click Exploit Hits WhatsApp Users on iOS and macOS

No click. No warning. Just compromised.

WhatsApp has released an emergency security update after discovering a zero-click vulnerability that may have been actively exploited in the wild.

The flaw, tracked as CVE-2025-55177 (CVSS 8.0), involves insufficient authorization in linked device synchronization messages. In practice, this could allow an attacker to trigger malicious content processing on a target’s device — with no user interaction required.

What Versions Are Affected?

  • WhatsApp for iOS prior to 2.25.21.73

  • WhatsApp Business for iOS prior to 2.25.21.78

  • WhatsApp for Mac prior to 2.25.21.78

Researchers believe the bug was chained with another recent Apple flaw (CVE-2025-43300) — a memory corruption vulnerability in the ImageIO framework used to process images. Apple confirmed this zero-day had already been exploited in targeted attacks.

Who Was Targeted?

According to Amnesty International’s Security Lab, the exploit was used in advanced spyware campaigns over the past 90 days. Among those targeted:

  • Journalists

  • Human rights defenders

  • Civil society groups

WhatsApp has notified a number of individuals believed to be impacted.

Why This Matters for Businesses

Even if your organization isn’t a direct target of government spyware, zero-click exploits represent a serious threat. Any iPhone, iPad, or Mac running outdated versions of WhatsApp could be vulnerable to silent compromise.

For SMBs, healthcare providers, law firms, and schools, this means:

  • Sensitive communications could be intercepted.

  • Confidential data may be exfiltrated without warning.

  • Compliance and privacy obligations could be at risk.

What You Should Do

✔️ Update WhatsApp immediately on all iOS and macOS devices.

✔️ Apply the latest Apple iOS, iPadOS, and macOS patches.

✔️ Consider a full device reset if you suspect compromise.

✔️ Review mobile device management (MDM) policies to ensure timely patching.

Zero-click exploits require no mistakes from the user. Defense depends on vigilance, patching, and layered security.

70% of all cyber attacks target small businesses. I can help protect yours.

#CyberSecurity #WhatsApp #ZeroDay #ZeroClick #MSP #DataProtection

Technology
Cybersecurity
Tips
Must-Read

10 Things I Never Do as a Cybersecurity Expert and why you should copy me

August 28, 2025
•
20 min read

10 Things I Never Do as a Cybersecurity Expert and why you should copy me.

Cybersecurity isn’t only about firewalls or expensive tools — it’s about habits. The wrong move in everyday life can expose you or your business.

Here are 10 things I avoid at all costs (and why you should too):

1️⃣ Hand Out My Real Birthday, Name, or Phone Number Online

Hackers collect these details to build identities for fraud and phishing.

2️⃣ Create Online Accounts I Don’t Need

Every extra account is another attack surface waiting to be breached.

3️⃣ Post Vacation Pics While I’m Still Away

Telling the world you’re not home? A free invitation to criminals.

4️⃣ Trust Free Wi-Fi or Free Apps

“Free” often means your personal data is the real currency.

5️⃣ Save Logins in Notes Apps or Browsers

These aren’t secure. Use a password manager with encryption.

6️⃣ Use Mom’s Maiden Name for Security Questions

Public records make it easy to guess. Opt for multi-factor authentication instead.

7️⃣ Skip Software Updates

Updates fix critical security flaws. Skipping them leaves the door wide open.

8️⃣ Plug Into Random Phone Chargers

Juice jacking attacks install malware in seconds. Carry your own cable or use a power bank.

9️⃣ Think Hackers “Aren’t Interested in Me”

Small businesses and individuals are prime targets — low-hanging fruit.

🔟 Overshare on Social Media

Hackers weaponize what you post: from your pet’s name (password clues) to your schedule.

🚨 The Bottom Line

Security isn’t just tech — it’s behavior. If your employees or family do any of these, you’re increasing your risk of attack.

70% of all cyber attacks target small businesses. I can help protect yours.

#CyberSecurity #CyberAwareness #MSP #SmallBusinessIT #DataProtection

AI
Must-Read
Technology
News
Tips

AI is dangerous for teens

August 28, 2025
•
20 min read

AI is dangerous for teens

Teen Suicide Sparks Lawsuit Against OpenAI Over ChatGPT Conversations

The family of 16-year-old Adam Raine has filed a wrongful death lawsuit against OpenAI, alleging that its chatbot, ChatGPT, acted as a “suicide coach” in the days leading up to their son’s death in April 2025.

According to the suit, Adam used the AI tool to discuss his anxiety, express suicidal thoughts, and explore methods of self-harm. The chatbot reportedly failed to trigger any emergency protocol or escalate the conversation, despite Adam’s repeated mentions of suicidal intent. In some exchanges, the bot allegedly analyzed a suicide plan and even offered suggestions to “upgrade” it.

The 40-page suit, filed in California Superior Court, names OpenAI and its CEO, Sam Altman, as defendants. It claims negligence, design flaws, and lack of safety warnings.

OpenAI responded that it is “deeply saddened” by Adam’s death and said it has implemented new safeguards to prevent similar incidents, including discouraging harmful advice and improving access to emergency services.

This case joins broader debates about AI’s role in mental health and whether platforms like ChatGPT should be held liable for harm caused by AI-generated content. Section 230, which protects tech platforms from liability for user content, may be tested in court as legal experts explore how it applies to AI interactions.

The lawsuit follows a similar complaint involving Character.AI and highlights growing concerns about how generative AI handles mental health queries, especially from minors.

Cybersecurity
Technology
Must-Read

Unsolicited Packages, Hidden Threats

August 27, 2025
•
20 min read

Unsolicited Packages, Hidden Threats: Brushing Scams Evolve Into Weaponized Attacks

An increasingly disturbing form of cybercrime is gaining traction across the U.S., merging the old-world tactic of unsolicited “brushing” packages with modern digital deception.

Once considered a quirky annoyance, brushing scams involved merchants sending low-value items—rubber chickens, novelty toys, knock-off electronics—to strangers in order to falsely inflate online reviews. The packages often arrived with the recipient’s name, address, and even phone number, despite no order being placed. While strange, these incidents were generally considered harmless.

That’s no longer the case.

Recent reports from the FBI and the U.S. Postal Service now warn of a darker evolution of the tactic. A growing number of these packages include QR codes—innocuous on the surface but weaponized beneath.

How It Works:

  • Recipients receive an unexpected package with their correct contact information.

  • A QR code is included—printed on an insert, stickered to the item, or part of a fake warranty or survey offer.

  • Once scanned, the QR code leads to:

    • Phishing sites designed to harvest personal credentials and banking data

    • Malware payloads that infect mobile devices and exfiltrate data silently

    • Surveys or contests that act as social engineering traps to gather sensitive information

Security experts say this marks a significant evolution in hybrid attacks—where physical social engineering intersects with digital exploitation. It also raises deeper concerns about how easily threat actors can access or purchase consumer information from data brokers, enabling them to create extremely believable delivery scams.

What You Should Do:

  • Never scan QR codes from unknown or unsolicited packages.

  • Report suspicious deliveries to the USPS Inspector General or your local law enforcement.

  • Monitor your credit and bank accounts if you believe your information may have been compromised.

  • Consider placing a freeze on your credit file with major bureaus if strange deliveries continue.

Law enforcement officials are still investigating the origin of these campaigns, with some believed to be linked to state-sponsored or international cybercrime rings.

This is no longer about free merchandise. It’s about infiltration, exploitation, and deception—delivered in an Amazon-sized box.

The real question is:

When that next package arrives… will you scan it?

Cybersecurity
Must-Read
Technology

When Your Password Manager Becomes a Backdoor.

August 25, 2025
•
20 min read

🛑 When Your Password Manager Becomes a Backdoor

40 Million Users Exposed by a Single Click

Password managers are supposed to be your digital vault. But what happens when that vault has an invisible backdoor?

Security researchers just uncovered a critical DOM-based vulnerability affecting 11 major password managers — and an estimated 40 million users are currently at risk.

The Password Managers Affected:

  • 1Password

  • Bitwarden

  • Dashlane

  • Enpass

  • iCloud Passwords

  • Keeper

  • LastPass

  • LogMeOnce

  • NordPass

  • ProtonPass

  • RoboForm

These aren’t fringe products. These are industry leaders, and most of them haven’t patched the flaw yet.

How the Attack Works

The vulnerability stems from a clickjacking exploit using invisible elements on fake websites. It works like this:

  1. You visit a realistic-looking site (spoofed login page, news article, etc.)

  2. A hidden login form triggers your password manager

  3. The manager auto-fills credentials without you knowing

  4. The attacker captures the data and walks away with your passwords, credit cards, and sensitive info

No warnings. No alerts. Just one fake click—and your vault is compromised.

What SMBs, Law Firms, Healthcare, and Schools Should Do

Your organization probably relies on one of these tools. If you’re not proactively managing risk, you may already be exposed.

✅ Disable auto-fill by default; switch to “on-click” mode in browser extensions

✅ Train users to avoid clicking unknown links, even if they look real

✅ Audit browser extensions across your entire organization

✅ Use browser isolation tools to contain risky sites

✅ Monitor for unusual access attempts to password managers and shared credentials

Bottom Line

Password managers are still essential. But they’re not set-it-and-forget-it tools. Like any piece of software, they require ongoing vigilance and smart usage.

The attackers didn’t crack your vault—they just tricked the butler into opening it.

70% of all cyber attacks target small businesses, I can help protect yours.

Mobile-Arena
Tips
Cybersecurity
Technology

YOU NEED TO UPDATE ALL OF YOUR DEVICES RIGHT NOW

August 23, 2025
•
20 min read

YOU NEED TO UPDATE ALL OF YOUR DEVICES RIGHT NOW

🍎 An Apple a Day… Doesn’t Fix Zero-Day Bugs

The latest iOS 18.6.2 update addresses a serious vulnerability in ImageIO, Apple’s image processing framework. This means a simple image—yes, just a picture—could be the entry point for a full-scale attack on your device.

Why this matters for SMBs, law firms, healthcare, and schools:

This isn’t some theoretical cybercrime. It’s real, it’s targeted, and it’s effective.

Attackers have used this exploit against:

  • Government officials

  • Journalists

  • Human rights advocates

  • And potentially… your organization next

If your business handles sensitive data—like patient records, legal files, or student information—this exploit could compromise it all through a single image.

What should you do now?

  • Update all Apple devices immediately (iPhones, iPads, Macs)

  • Enable automatic updates organization-wide

  • Review endpoint protection to detect image-based exploits

  • Consider MDM (Mobile Device Management) for visibility and control

Even if you’re using Android, don’t relax—turn on auto-updates and ensure you’re on the latest software version. This isn’t about Apple vs. Android. It’s about staying vigilant.

What this means going forward:

Cybersecurity isn’t just about blocking phishing links and malware anymore. Threat actors are getting more creative, exploiting features we take for granted—like how a phone processes images.

Staying safe requires layered defenses, regular updates, and a zero-trust mindset. In 2025, patching isn’t optional—it’s operational survival.

70% of all cyber attacks target small businesses, I can help protect yours.

Previous
Next
About
Managed ServicesCybersecurityOur ProcessWho We AreNewsPrivacy Policy
Help
FAQsContact UsSubmit a Support Ticket
Social
LinkedIn link
Twitter link
Facebook link
Have a Question?
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Copyright © {auto update year} Gigabit Systems All Rights Reserved.
Website by Klarity
Gigabit Systems Inc. BBB Business Review