8776363957
Connect with us:
LinkedIn link
Facebook link
Twitter link
YouTube link
Gigabit Systems logo
Link to home
Who We AreManaged ServicesCybersecurityOur ProcessContact UsPartners
The Latest News in IT and Cybersecurity

News

A cloud made of diagonal linesA cloud made of diagonal lines
A pattern of hexagons to resemble a network.
AI
Cybersecurity
Technology
Must-Read

Chips Don’t Lie: How the U.S. Is Tracking AI Hardware

August 13, 2025
•
20 min read

🎯 Chips Don’t Lie: How the U.S. Is Tracking AI Hardware

Hidden trackers in AI servers reveal a growing cyber-geopolitical chess match

What happens when cutting-edge AI chips meant for approved destinations mysteriously wind up in unauthorized Chinese facilities?

You track them.

That’s exactly what U.S. authorities are doing, embedding stealth tracking devices in select AI chip shipments to uncover illegal diversions. According to an exclusive Reuters report, the trackers have been found in Dell and Super Micro shipments containing chips from Nvidia and AMD, with some devices even hidden inside the servers themselves.

This isn’t science fiction. It’s the latest escalation in the battle over semiconductor dominance, and it’s already impacting global tech supply chains.

What This Means for U.S. Businesses

If you’re in healthcare, law, education, or running an SMB—you might think this has nothing to do with you.

Think again.

  • If your IT vendor cuts corners and sources from unauthorized resellers, you may unknowingly use compromised or illegal tech.

  • You’re now part of a supply chain under surveillance.

  • Devices in your server room might carry hidden government trackers — not because you’re guilty, but because the chip passed through a flagged reseller.

The line between global policy and local IT is blurring. You need a compliant, secure MSP who understands the legal, ethical, and cyber implications of your hardware sourcing.

What You Can Do Today

  • Verify your vendors. Know where your servers and components are coming from.

  • Document your hardware inventory and ensure nothing has been tampered with.

  • Work with cybersecurity and IT partners who follow export compliance best practices and don’t cut costs through shady resellers.

  • Ask questions about your servers and cloud systems. If your provider can’t give you clear sourcing answers, find one who can.

70% of all cyber attacks target small businesses. I can help protect yours.

#CyberSecurity #ITCompliance #ManagedServices #SupplyChainSecurity #MSP

Technology
AI
News
Must-Read

Elon Musk is stirring the pot again this time with some very difficult questions for Apple.

August 13, 2025
•
20 min read

Elon Musk is stirring the pot again — and this time, Apple’s in the crosshairs.

Musk claims X is now the #1 news app globally, and his AI chatbot Grok is sitting at #5 among all apps. Yet, neither is featured in Apple’s coveted “Must Have” section of the App Store.

That section isn’t an algorithmic ranking — it’s handpicked by Apple’s editorial team. Which raises the question: if the #1 and #5 apps aren’t in there, what’s the real selection criteria?

Is Apple quietly protecting its brand image by keeping controversial figures and platforms off the list? Is this about politics? Or is it simply how App Store curation has always worked? The truth is, when companies like Apple hold this much influence over what billions of people see, the line between “editorial choice” and “business strategy” starts to blur.

And this isn’t just about Musk or X. It’s about whether tech giants — who act as the gatekeepers of the digital economy — have an ethical responsibility to make these processes transparent. When you control the world’s most valuable digital storefront, should personal bias or political considerations ever play a role?

Because here’s the thing: if being the top-ranked app in your category isn’t enough to secure a spot in “Must Have,” then maybe “Must Have” isn’t about the must-have apps at all. Maybe it’s about the must-have image Apple wants to project.

The bigger question for every business leader, entrepreneur, and innovator is this: if your growth can be stalled or your reach throttled simply because you don’t align with a curator’s values, how do you build a business in that environment? Is that just competition — or quiet censorship in disguise?

One thing’s for sure — this conversation is going to get louder. And how Apple responds (or doesn’t) could set a precedent for the future of app discovery.

Must-Read
Travel
Cybersecurity
Tips

Airport Worker Warns of Growing Luggage Tag Scam Targeting Travelers

August 12, 2025
•
20 min read

Airport Worker Warns of Growing Luggage Tag Scam Targeting Travelers

A Delta Air Lines baggage claims manager has issued a warning about a fast-growing scam that uses discarded luggage tags to steal personal information and file fraudulent claims with airlines.

Scammers reportedly watch passengers in busy baggage claim areas, waiting for them to remove and toss their luggage tags. These tags often contain full names, flight details, and even membership numbers — all valuable for criminals posing as passengers with “lost” luggage to claim compensation.

The warning, first shared on Reddit, urges travelers to avoid removing luggage tags until safely home. Even then, experts recommend shredding or cutting them up to prevent misuse. The risk isn’t confined to airports — a former hotel employee noted similar fraud from tags discarded in hotel rooms.

Security professionals also stress the same caution for printed boarding passes, which can expose similar details. Some airports, like those in Japan, now provide secure tag disposal bins at baggage claim exits to help combat the issue.

70% of all cyber attacks target small businesses, I can help protect yours.

Technology
Cybersecurity
News
Science

End of an Era for Dial-Up

August 11, 2025
•
20 min read

End of an Era for Dial-Up

After 34 years, AOL will officially pull the plug on its dial-up internet service on September 30, 2025 — taking with it the AOL Dialer software and AOL Shield browser. Once the gateway to the World Wide Web for millions, the service’s iconic screeching connection tones will fade into history.

While only around 250,000 U.S. households still rely on dial-up, the shutdown highlights a reality: legacy systems are vanishing, and with them, some users’ only connection to the internet. For those in rural or hard-to-reach areas, satellite internet and emerging 5G home solutions will be the likely replacements.

It’s a reminder for both individuals and businesses to stay ahead of tech obsolescence — because the tools you depend on today may not exist tomorrow. Planning for transitions in advance ensures continuity, whether it’s your internet connection or critical business systems.

70% of all cyber attacks target small businesses, I can help protect yours.

Technology
Cybersecurity
Must-Read
News

Hackers Hit Healthcare: DaVita Breach Exposes Over 900,000 Patients

August 6, 2025
•
20 min read

Hackers Hit Healthcare: DaVita Breach Exposes Over 900,000 Patients

A major ransomware attack has rocked the healthcare sector yet again — this time targeting DaVita, one of the largest kidney dialysis providers in the U.S.

What Happened?

Hackers gained unauthorized access to DaVita’s servers in late March 2025, breaching primarily its lab infrastructure. While DaVita discovered the intrusion in mid-April, a staggering amount of sensitive data had already been exfiltrated.

The Interlock ransomware group has claimed responsibility, boasting it stole 1.5TB of data — including more than 683,000 files. Comparitech reports that over 900,000 individuals may be affected.

What Was Stolen?

DaVita’s investigation reveals that the stolen data varies from person to person, but can include:

  • Full names and addresses

  • Dates of birth and Social Security numbers

  • Health insurance and medical treatment details

  • Tax identification numbers

  • Images of checks sent to DaVita

This isn’t just a data breach — it’s a catastrophic violation of trust and privacy, particularly damaging because it involves healthcare information, which is among the most difficult data to recover from once compromised.

Why This Matters

Cybercriminals continue to target healthcare providers for one reason: the data is rich, sensitive, and highly profitable on the dark web. And unlike a stolen credit card, medical records and SSNs can’t simply be reissued.

This breach adds DaVita to a growing list of healthcare organizations that have faced ransomware attacks in recent years — highlighting the urgent need for layered cybersecurity defenses and employee awareness training in critical infrastructure sectors.

What To Do If You’re Affected

DaVita has started mailing data breach notification letters. If you or a loved one received one, take these actions immediately:

  • Freeze your credit with all three major bureaus

  • Sign up for identity theft protection (DaVita may offer this for free)

  • Monitor medical billing statements for signs of fraud

  • Report suspicious activity to the FTC’s identity theft site: identitytheft.gov

70% of all cyber attacks target small businesses. I can help protect yours.

Must-Read
Cybersecurity
News
Tips
Technology

MFA or Pay the Price

August 3, 2025
•
20 min read

MFA or Pay the Price

Hamilton just got handed an $18.3M cybersecurity bill.

Why? Their insurer denied the claim. The reason? No MFA.

A Wake-Up Call for Every Organization

In February 2024, the City of Hamilton fell victim to a devastating ransomware attack. 80% of their network went dark. Transit, tax processing, fire department records—wiped or frozen.

The attackers demanded $18.5 million. The city refused to pay.

Smart move ethically. But still: the recovery cost was nearly the same.

And then came the second gut punch:

The insurance company denied coverage due to a lack of Multi-Factor Authentication (MFA) — a basic security control.

“We Have Insurance” Isn’t a Security Strategy

Cyber insurance is not a substitute for cybersecurity.

It’s a safety net — but only if your organization follows best practices.

Many policies now require MFA, endpoint protection, user training, and regular patching.

Fall short? You’re on your own.

What Does This Mean for SMBs, Schools, Law Firms, and Clinics?

If a major Canadian city can be devastated by an overlooked MFA rollout, imagine what one missed step could cost a smaller organization.

  • Schools hold sensitive student data

  • Healthcare providers store PHI

  • Law firms manage confidential client communications

One breach could wreck more than your systems. It could destroy trust — and your bottom line.

5 Takeaways You Can’t Ignore

  1. Implement MFA — on all cloud services, email accounts, and admin portals

  2. Test your backups — don’t assume they’re working

  3. Train your users — phishing is still the #1 attack vector

  4. Know your insurance policy — do you meet the requirements?

  5. Partner with a cybersecurity-first MSP — like Gigabit Systems

70% of all cyber attacks target small businesses, I can help protect yours.

#Cybersecurity #ManagedIT #MSP #Ransomware #SMBSecurity

Technology
Cybersecurity
Must-Read
Tips

Too Late to Insure a Burning House

July 30, 2025
•
20 min read

🔥 Too Late to Insure a Burning House

“Can you do cybersecurity… without the ongoing stuff?”

A client once asked us that. It’s like saying: “I want insurance—just when my house is on fire.”

Why Cybersecurity Can’t Be a One-Time Fix

Cybersecurity isn’t a fire extinguisher. It’s a sprinkler system.

Hackers don’t wait for your annual checkup—they look for cracks daily.

Yet many small businesses, law firms, schools, and even healthcare practices still treat cybersecurity as a checkbox:

  • A one-time antivirus install

  • A firewall from five years ago

  • “We’re too small to be a target”

Reality check: 70% of cyber attacks target small businesses. Most never see it coming until it’s too late.

What “Ongoing” Really Means

At Gigabit Systems, ongoing doesn’t mean “endless bills.”

It means:

  • Real-time monitoring of threats

  • Patching vulnerabilities as they emerge

  • Simulated phishing tests to train staff

  • Backups that actually work when disaster strikes

It’s not overkill. It’s survival.

If you wouldn’t drop your health insurance just because you feel okay this month, why gamble with your business?

Think Like a Hacker

Hackers don’t care if your firm has 5 users or 500.

They just want:

  • One stolen email login

  • One unpatched device

  • One distracted employee

Ongoing cybersecurity isn’t a luxury.

It’s the difference between a near-miss and a headline.

70% of all cyber attacks target small businesses, I can help protect yours.

Must-Read
Technology
Science
Cybersecurity
News

Even spy agencies are getting hacked.

July 30, 2025
•
20 min read

Even spy agencies are getting hacked.

Hackers have breached a top-secret portal used by the CIA and other intelligence agencies to manage sensitive contracts, raising serious alarms across the national security landscape. The compromised site, the Acquisition Research Center, is run by the National Reconnaissance Office (NRO), which oversees the U.S. spy satellite program.

Sources familiar with the breach say data from Digital Hammer, a classified CIA initiative, was exposed — along with proprietary intelligence technologies and personal information submitted to support covert operations. The full extent of the breach is still unknown, but insiders suggest the compromise could stretch into programs tied to Space Force surveillance and missile defense efforts, including the Golden Dome.

This breach comes on the heels of another sobering disclosure: Chinese state-backed hackers accessed systems inside the Department of Energy’s National Nuclear Security Administration, the central hub of the U.S. nuclear arsenal.

This isn’t just a federal problem. It’s a loud and clear warning for every business with sensitive contracts, vendor portals, or IP. If cybercriminals can infiltrate intelligence networks and nuclear agencies, what’s protecting your organization?

Supply chain targeting is one of the fastest-growing forms of cyberattack. Hackers don’t always go after the fortress — they go after the vendor with a side door. That could be your company, especially if you provide services to schools, law firms, healthcare clinics, or government contractors.

Cybersecurity is no longer about perimeter firewalls or reactive fixes. You need real-time monitoring, hardened endpoint security, and a zero-trust model that assumes every login could be a threat.

The breach of America’s most secretive platforms shows how high the stakes are. The question isn’t if your business will be tested — it’s whether your defenses are ready when it happens.

70% of all cyber attacks target small businesses. I can help protect yours.

AI
Technology
News

YouTube Is Watching Your Age, Even If You Lie

July 30, 2025
•
20 min read

YouTube Is Watching Your Age—Even If You Lie

YouTube is rolling out a new AI-powered age detection system across the U.S., aiming to better protect teenagers online — whether or not they enter their real birthdate. The platform will now infer users’ ages using machine learning, analyzing behavior like the types of videos you watch, what you search for, and how long your account has been active.

If the system determines you’re under 18, YouTube will automatically enforce teen-specific protections, including:

  • Disabling personalized ads

  • Turning on digital wellbeing tools

  • Limiting exposure to repetitive or mature content in recommendations

The system has already been used in other countries, and YouTube reports positive results. U.S. users will see the rollout in the coming weeks, with global expansion planned.

If you’re wrongly flagged as underage, YouTube will allow you to verify your age using a credit card or government ID. Only verified adults will be able to view age-restricted content.

This AI approach doesn’t use facial recognition or camera scans. Instead, it focuses on privacy-preserving signals embedded in your account behavior — balancing protection and discretion. YouTube says it’s working closely with creators to ensure monetization isn’t unfairly impacted by this shift.

Whether you’re a parent, educator, or business that posts youth-friendly content, this change matters. It’s another step toward a safer platform — but also a reminder of how closely platforms watch how we watch.

====================================

70% of all cyber attacks target small businesses, I can help protect yours.

Previous
Next
About
Managed ServicesCybersecurityOur ProcessWho We AreNewsPrivacy Policy
Help
FAQsContact UsSubmit a Support Ticket
Social
LinkedIn link
Twitter link
Facebook link
Have a Question?
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Copyright © {auto update year} Gigabit Systems All Rights Reserved.
Website by Klarity
Gigabit Systems Inc. BBB Business Review