8776363957
Connect with us:
LinkedIn link
Facebook link
Twitter link
YouTube link
Gigabit Systems logo
Link to home
Who We AreManaged ServicesCybersecurityOur ProcessContact UsPartners
The Latest News in IT and Cybersecurity

News

A cloud made of diagonal linesA cloud made of diagonal lines
A pattern of hexagons to resemble a network.
Cybersecurity
News

$1.3M Jewelry Store Heist Highlights a Bigger Security Problem

June 12, 2025
•
20 min read

💎 $1.3M Jewelry Store Heist Highlights a Bigger Security Problem

In just five hours, thieves disabled internet, sawed through a steel safe, and vanished with $1.3 million worth of jewelry.

The overnight heist at Rick Kleinvehn Diamond Brokers in South Barrington, IL wasn’t just about jewelry. It was a warning — to every business owner who thinks alarm systems and cameras are enough.

This is a case study in cyber-physical attacks: where digital sabotage (cutting internet access) pairs with surgical physical intrusion (wet saw through reinforced steel) — and it’s becoming more common.

🧠 How It Went Down

According to the owner:

  • Internet to the building was cut first
  • A wall was breached behind the safe, bypassing visible defenses
  • Thieves used a wet saw and buckets of water to cool metal while cutting for hours
  • Over 1,000 pieces of jewelry were taken — nearly 90% of the store’s inventory
  • The burglars knew exactly where to find the hidden safe

👀 Evidence suggests an insider tip or prior surveillance.

📍 Why This Should Terrify More Than Jewelers

Two weeks later, a nearly identical break-in occurred in California — through a candy store wall, into a neighboring jewelry shop. Coincidence?

Maybe. But for law firms, medical clinics, private schools, and retail operations, this is a wake-up call.

Here’s the real threat:

If thieves can cut your internet, they can disable your alarms, block your cameras from syncing to the cloud, and stall panic alerts. That gives them time.

🛡 What You Can Do Today

At Gigabit Systems, we help businesses protect data, inventory, and people.

Here’s how:

✅ Internet Redundancy

Set up failover LTE or Starlink backups for alarm & surveillance continuity.

✅ Local + Cloud Video Storage

Don’t rely on cameras that only record to the cloud — use hybrid systems.

✅ Physical Penetration Testing

We can simulate physical breaches — and show you where you’re vulnerable.

✅ Smart Safes + Access Logs

Upgrade safes with multi-user biometric logging, tamper alerts, and internal audit trails.

✅ Security Awareness for Staff

Teach employees how to spot surveillance behavior and social engineering tactics.

🎯 Bottom Line

This wasn’t a smash-and-grab. It was coordinated, patient, and precise. And as businesses rely more on cloud-connected devices, hybrid threats will keep rising.

👇 Comment if you’ve reviewed your security plan in the last 12 months.

🔁 Share this with your ops manager or facilities lead.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

‍

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

‍

#PhysicalSecurity #CyberSecurity #BusinessContinuity #HybridThreats #RetailSecurity

‍

Cybersecurity
News
Tips

Samsung Issues Critical Warning: Restart Your Phone — Every Day

June 9, 2025
•
20 min read

📱 Samsung Issues Critical Warning: Restart Your Phone — Every Day

If you use a Samsung Galaxy — or manage employees who do — it’s time to rethink how often you reboot.

Samsung is urging all Galaxy users to restart their phones daily as a new wave of Android-targeted attacks continues to gain traction. And this isn’t just about performance — it’s becoming a core part of mobile cyber hygiene.

At Gigabit Systems, we help clients secure not just desktops and servers, but phones too — because increasingly, they’re the front lines of cyberattacks.

‍

🛡 Why Restarting Matters for Security

Zero-click attacks — exploits that don’t require the user to tap, download, or click anything — are on the rise.

These often exploit:

  • Messaging app vulnerabilities (iMessage, WhatsApp, RCS)
  • Background processes in Android or iOS
  • Forensic tools used by law enforcement or criminal actors to extract data silently

🧠 Rebooting clears temporary memory, disrupts malware persistence, and forces background apps to reload securely.

“Rebooting your phone daily is your best defense against zero-click attacks.”
— Ricky Cole, iVerify

🔄 What Samsung Recommends

Samsung now officially encourages daily restarts of all Galaxy devices.

📲 You can even automate restarts in device settings:

  1. Go to Device Care > Auto Optimization
  2. Toggle “Auto restart when needed”
  3. Schedule for nighttime or low-use hours

This can help:

  • Stop freezing and lag (yes, that too)
  • Clear session-based exploits
  • Close unauthorized persistent connections

📣 Why It Matters for Your Business

If your employees use BYOD smartphones to access work email, Teams, or patient/client records — this isn’t optional anymore.

✅ We recommend:

  • Enabling mobile endpoint protection (e.g., Microsoft Defender for Endpoint or Lookout)
  • Enforcing auto-restart policies via MDM (Intune, Jamf, etc.)
  • Requiring app isolation for business-critical tools (e.g., Outlook, Teams, Google Workspace)
  • Educating staff on zero-click threats and mobile security hygiene

🧠 Mobile Is the New Attack Surface

It’s not just laptops and desktops anymore. Phones hold:

  • MFA codes
  • Password vaults
  • Secure notes
  • Business communications
  • Customer data

A compromised device can open the door to account takeovers, data leaks, and business email compromise.

👇 Comment if your org has a mobile policy.

🔁 Share this with anyone managing devices, even for a small team.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

‍

#CyberSecurity #MobileSecurity #ZeroClickAttack #AndroidTips #ManagedITServices

‍

AI
Cybersecurity
News
Tips

What ChatGPT Knows About You — And How to Make It Forget

June 7, 2025
•
20 min read

🧠 What ChatGPT Knows About You — And How to Make It Forget

Think of ChatGPT as a brilliant digital assistant with a perfect memory — sometimes too perfect.

It can remember where you live, what you’re researching, and what’s going on in your personal life… all from casual chats.

But what if you didn’t want it to?

This post breaks down:

  • What ChatGPT remembers about you
  • How to view and delete that data
  • How to use ChatGPT privately and securely

🔍 How ChatGPT Collects and Remembers Personal Info

When you chat with ChatGPT while logged in, it stores “memories” to personalize future responses. This includes:

  • Where you live
  • Your profession
  • Projects you’re working on
  • Family or health details you’ve voluntarily shared

You’ll sometimes see an “Updated saved memory” label in chat — that’s your cue that the AI just learned something new about you.

🧾 How to See What ChatGPT Knows About You

Just ask:

What do you know about me?

If you’re logged in, ChatGPT will list what it’s remembered — and even offer to forget or update anything.

🧹 How to Delete or Manage ChatGPT’s Memory

To fully manage your stored data:

  1. Click your profile icon > Settings
  2. Go to Personalization > Manage memories
  3. Delete individual items using the bin icon
  4. Or click Delete All to wipe everything

📌 Pro Tip: Just asking the chatbot to forget isn’t always effective. Use the settings panel for full control.

🔒 How to Use ChatGPT Confidentially

If you want to discuss something sensitive (business strategy, health issues, finances), use Temporary Chat Mode:

🟢 Click the dotted speech bubble icon (next to your profile picture)

🟢 This starts a memory-free session — nothing is saved

🟢 But remember: once you leave, you can’t return to that chat

🔐 Secure Your ChatGPT Account

If your ChatGPT account stores personal info, you should lock it down just like your email or bank login.

Do this now:

  1. Go to Settings > Security
  2. Enable Multi-Factor Authentication (MFA)
  3. Use apps like Authy or Google Authenticator for added protection

🔐 That way, even if someone steals your password, they can’t access your AI data.

Why This Matters for Businesses

At Gigabit Systems, we help SMBs, law firms, and healthcare teams use AI responsibly.

⚠️ If your team is feeding client names, PHI, passwords, or legal notes into AI tools — you need to understand how memory works.

We offer:

  • AI policy guidance
  • Staff training on secure usage
  • ChatGPT configuration support for business
  • MFA + privacy audits

🔁 Share this with a colleague who chats with ChatGPT regularly.‍

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

‍

‍

#DataPrivacy #ChatGPT #AIPrivacy #CyberSecurity #ManagedITServices

‍

Cybersecurity
News
Tips

Imagine if your phone took a screenshot of everything you did—every five minutes—and sent it to your boss. Or worse, your government.

June 10, 2025
•
20 min read

📱 A Phone That Spies for the State: North Korea’s 5-Minute Screenshot Rule

‍

Imagine if your phone took a screenshot of everything you did—every five minutes—and sent it to your boss. Or worse, your government.

‍

That’s not dystopian fiction—it’s real life in North Korea.

A smartphone smuggled out of the regime and obtained by the BBC reveals shocking surveillance tactics:

  • Automatic screenshots every 5 minutes
  • Files saved on the device but inaccessible to users
  • Language substitution: “South Korea” becomes “puppet state”
  • South Korean slang auto-corrected with propaganda-friendly terms

The Implications Go Far Beyond Borders

North Korea’s “screenshot surveillance” is extreme, but it’s a wake-up call for organizations everywhere:

Technology can be used to protect—or to control.

In workplaces across the U.S., similar tactics—like screen capture tools, keyloggers, and hidden monitoring software—can be misused without oversight.

In schools, law firms, and hospitals, unregulated device access and tracking software can lead to compliance violations, breaches of trust, and serious legal risks.

What This Teaches Us About Digital Ethics and Security

👁 At Gigabit Systems, we help organizations balance visibility and privacy with responsible IT policies. Surveillance tech must be:

  • Transparent to users
  • Securely encrypted
  • Governed by policy—not paranoia
  • In line with HIPAA, FERPA, and legal privilege requirements

🔐 When digital trust is broken, your clients, patients, and users notice.

4 Critical Questions for Your Organization:

  1. Who has visibility into employee or student devices?
  2. Are monitoring tools disclosed and policy-based?
  3. Is screen or data capture happening without consent?
  4. Are your tools helping people—or quietly controlling them?

It’s not about paranoia. It’s about principle.

👇 Comment if your company has debated the ethics of employee monitoring.

🔁 Share this with an educator, attorney, or executive dealing with device policy decisions.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

‍

‍

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

‍

‍

#CyberSecurity #DigitalPrivacy #EmployeeMonitoring #ITPolicy #ManagedITServices

‍

Cybersecurity
News
Tips

When Your Browser Becomes the Spy

June 13, 2025
•
20 min read

👀 When Your Browser Becomes the Spy: New Chrome Exploit Exposed

‍

Your browser might be watching you—literally.

‍

Security researcher mr.d0x just revealed a terrifyingly simple method to turn Google Chrome (and other Chromium-based browsers like Edge, Brave, and Opera) into full-blown spyware. No malware downloads. No user clicks. Just a few command-line flags.

Think screen recordings, mic audio, and webcam access—all without your knowledge.

How It Works

Using a PowerShell script, an attacker with access to your system can:

  • Launch a headless or invisible browser window
  • Auto-enable screen sharing using --auto-select-desktop-capture-source=Entire
  • Use JavaScript to take screenshots every 3 seconds
  • Auto-capture camera and mic feeds using --auto-accept-camera-and-microphone-capture
  • Exfiltrate all of this to a remote server in real time

No browser extensions. No suspicious software. Just legitimate tools misused for espionage.

Why It Matters for SMBs, Law Firms, Schools, and Healthcare

If your endpoints aren’t tightly controlled, a single compromised machine could leak:

  • Patient health info (violating HIPAA)
  • Client legal files
  • Student data under FERPA
  • Internal business IP, financials, or communications

This type of attack is stealthy, remote-controlled, and bypasses many endpoint detection systems because it uses native system tools.

How to Defend Against Browser-Based Spyware

At Gigabit Systems, we help organizations defend against advanced threats like this. Here’s what we recommend:

✅ Monitor for unusual command-line flag use with EDR tools

✅ Block PowerShell for non-admin users

✅ Restrict outbound connections to untrusted domains

✅ Disable camera/mic access at the OS level where unnecessary

✅ Educate staff about social engineering tactics like fake CAPTCHA sites or fake support pop-ups

And most importantly—audit your browser usage policies. Browsers aren’t just for surfing anymore—they’re a massive attack surface.

👇 Comment if your organization has browser security controls in place.

🔁 Share with a colleague who still thinks browsers are “safe by default.”

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

‍

‍

#CyberSecurity #BrowserSecurity #ManagedITServices #EndpointProtection #SmallBusinessSecurity

‍

Crypto
News

A string of brutal kidnappings has crypto holders on high alert — and one family just took their security offline, off-grid, and global.

June 9, 2025
•
20 min read

🧳 Bitcoin Goes Global: Why One Family Hid Crypto Keys on Four Continents

A string of brutal kidnappings has crypto holders on high alert — and one family just took their security offline, off-grid, and global.

The Taihuttu family, known as the “Bitcoin Family,” sold everything to go all-in on crypto in 2017. Today, they live nomadically and unbanked — and they’ve just ditched hardware wallets in favor of a radical, decentralized system that splits their Bitcoin seed phrases across four continents.

“Even if someone held me at gunpoint, I can’t give them access. The seed is split, encrypted, and scattered,”
— Didi Taihuttu

Why the Change?

After receiving credible threats and seeing other crypto figures kidnapped for ransom — including Ledger co-founders and a Manhattan tourist tortured for 17 days — Taihuttu re-engineered his family’s entire crypto custody model:

🔐 Seed phrases are split 6 words at a time (4 sets = 24 words)

🪙 Each set is either encrypted digitally or etched into fireproof steel plates

🌍 Plates are hidden in physical locations on 4 continents

🧩 Even if someone finds 18 of the 24 words, it’s useless without Taihuttu’s personal encryption system

📲 Hot wallets are protected with multi-signature and MPC technology

Why It Matters for Businesses, Law Firms, and Institutions

If a family of five is willing to go to this length, what are you doing to protect your crypto assets?

Whether you manage client funds, support blockchain initiatives, or simply hold digital assets, you need to rethink:

  • 🔄 Single points of failure — Are your wallets centralized or duplicated?
  • 🛡️ Custody risk — Are third-party devices or platforms holding your private keys?
  • 🧠 Staff training — Could an attacker exploit an unaware employee?
  • 🔑 Access models — Are you using multi-signature or MPC-based security?
“We’ve been famous in a niche market. Now that niche is big — and dangerous.”

What You Can Do Now

At Gigabit Systems, we help clients transition to hardened, zero-trust digital asset security strategies:

✅ Adopt multi-signature wallets (like Safe, formerly Gnosis)

✅ For large holdings, consider MPC (Multi-Party Computation) protocols

✅ Split cold storage geographically or organizationally — don’t rely on one custodian

✅ Ditch untrusted hardware — audit all third-party wallet tools

✅ Stay invisible — reduce public exposure of digital holdings

If the world’s most committed crypto nomads are moving off hardware wallets and decentralizing their key access globally… it might be time you did, too.

👇 Comment if your firm or practice handles crypto or digital assets.

🔁 Share with anyone whose wallet might be more accessible than they think.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

‍

‍

#CryptoSecurity #Bitcoin #SelfCustody #ManagedITServices #DecentralizedFinance

‍

Tips
Cybersecurity
News

Crypto wallets under attack

•
20 min read

💸 Crypto Trap: New NFT “Airdrop” Scheme Drains Wallets in Seconds

The FBI just issued a critical alert: scammers are exploiting the Hedera Hashgraph network’s NFT airdrop feature to instantly steal crypto. What looks like a free reward is a cleverly disguised phishing attack.

How the Scam Works

Cybercriminals send unauthorized NFTs or tokens to your non-custodial Hedera wallet. When the “transaction” appears, a “memo” field urges you—with a link—to claim your reward. Clicking it leads to a fake dApp/page that asks for your wallet credentials or seed phrase. Once entered, they empty your wallet in seconds.

  • Scams are circulating via social media ads, phishing emails, and fake project websites  .

  • Once scammers have your seed phrase, they gain full control of your funds.

Why This Impacts Businesses, Law Firms, and Healthcare Providers

Even if you’re not a serious crypto investor, these threats matter:

  • Legal firms handling crypto casework

  • Healthcare orgs piloting tokenized patient incentives

  • Schools exploring blockchain credentials

  • SMBs & MSPs offering blockchain trials to clients

A compromised wallet can lead to unauthorized transactions, exposed private data, and regulatory headaches.

How to Defend Your Wallet and Your Organization

At Gigabit Systems, we recommend these proactive defenses:

✅ Never click unsolicited NFT airdrop links.

✅ Verify airdrops via official Hedera channels before interacting.

✅ Never share seed phrases or passwords.

✅ Monitor wallet activity for unfamiliar transactions.

✅ Revoke unused dApp permissions using tools like revoke.cash.

✅ Use hardware wallets for storing significant crypto assets.

These simple steps dramatically reduce your exposure to wallet drains.

Final Word

This isn’t just a crypto issue—it’s a cybersecurity case study in trust and verification. As emerging web3 technologies integrate into professional systems, vigilance becomes critical. If you’re advising clients or using these platforms, pass this on.

👇 Comment if your organization deals with blockchain or crypto in any capacity.

🔁 Share this with anyone using Hedera, NFTs, or non-custodial wallets.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

#CyberSecurity #CryptoScam #NFTFraud #ManagedITServices #Web3Security

Tips
News
Cybersecurity

United Airlines’ ambitious rollout of free Starlink Wi-Fi has just encountered unexpected headwinds

•
20 min read

🛰️ Starlink Hits Turbulence: United Temporarily Shuts Down Wi-Fi on Regional Jets

United Airlines’ ambitious rollout of free Starlink Wi-Fi has just encountered unexpected headwinds.

Onboard connectivity has been shut down across all of United’s Embraer E175 regional jets equipped with Starlink—after pilots reported radio interference with critical aircraft communications.

The source? Static affecting VHF radios, which pilots use to talk with air traffic control.

What Happened?

United had recently installed Starlink antennas on nearly two dozen E175 aircraft. But shortly after deployment, pilots began noticing static and interference on their comms systems, prompting United to disable Starlink in-flight internet out of caution.

According to the airline:

  • Starlink does not pose a flight safety issue, but the interference requires fixing

  • United and Starlink have identified a solution and are rolling it out during regular maintenance cycles

  • Roughly one-third of affected planes have already been fixed and are back online

Why This Matters for Business and IT Leaders

At Gigabit Systems, we help companies evaluate real-world applications of satellite and emerging technologies—and this case is a strong reminder that:

✅ “Plug-and-play” rarely works at aviation or enterprise scale

✅ Interference isn’t always digital—it can be radio frequency (RF) based

✅ Even robust tech like Starlink needs fine-tuning for safety-critical environments

Whether you’re integrating IoT sensors, wireless comms, or remote connectivity into your operations, testing for side effects like cross-channel interference is vital.

What’s Next?

United plans to:

  • Resume full Starlink Wi-Fi service on the E175 fleet within weeks

  • Expand Starlink installs to 40 more E175s and the CRJ-550 fleet

  • Keep retrofitting its entire regional jet fleet by end of year

  • Offer free internet access via Starlink for MileagePlus members—no additional cost

The Bigger Lesson

Innovation isn’t just speed. It’s stability.

If your business is investing in satellite connectivity, Starlink, or any high-bandwidth wireless tech—don’t skip RF testing, compliance checks, or environment-specific tuning.

👇 Comment if you’ve experienced issues integrating wireless or satellite tech.

🔁 Share with a business or travel exec curious about Starlink’s commercial impact.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

#Starlink #SatelliteTech #CyberSecurity #ManagedITServices #WiFiInnovation

Tips
News
Cybersecurity

Musk vs. Cook: The $5B Satellite Standoff That Changed Mobile Forever

June 8, 2025
•
20 min read

🚀 Musk vs. Cook: The $5B Satellite Standoff That Changed Mobile Forever


Elon Musk gave Apple 72 hours to pay $5 billion. Tim Cook said no. So Elon followed through.


Three years ago, Musk demanded that Apple integrate Starlink into its devices or face direct competition. Apple refused—and now, ironically, iPhones still connect to Starlink’s satellites… just not through Apple.


“You have 72 What Happened?



Apple opted for a low-risk satellite partnership with Globalstar to power its SOS emergency satellite feature. Meanwhile, Musk launched Starlink Direct to Cell in partnership with T-Mobile, enabling:


  • Full internet connectivity from space

  • Messaging, calling, and even social media—no tower needed

  • Compatibility with any phone, including iPhones (as long as you’re on T-Mobile)



Today, Musk’s space-based network is rapidly expanding—already active in regions like Chile and Peru, with broader coverage coming soon.



Why This Is a Masterclass in Strategy (and Risk)



At Gigabit Systems, we work with organizations that face similar (but scaled-down) dilemmas every day:


  • Should you embrace disruptive tech, or wait for market stability?

  • Should you partner with bold, visionary vendors—or keep things boring and safe?

  • Is control more important than innovation?



Apple chose safety. Musk chose scale.

Now Apple may be playing catch-up.



What This Teaches Businesses, Schools, and Healthcare Leaders



✅ Risk-averse partnerships avoid drama—but may also miss revolutions

✅ Connectivity is evolving faster than mobile carriers can adapt

✅ Your next IT provider might be a space company

✅ Vendor relationships aren’t just tech—they’re philosophy



Your Turn



Are your technology partnerships driving innovation or avoiding disruption?


👇 Comment if you’ve ever hesitated to adopt new tech due to vendor risk.

🔁 Share with a colleague choosing between two competing providers.



====================================


Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!



Because 70% of all cyberattacks target small businesses—

I can help protect yours.





#DigitalStrategy #Starlink #TechLeadership #ManagedITServices #InnovationVsRisk




Previous
Next
About
Managed ServicesCybersecurityOur ProcessWho We AreNewsPrivacy Policy
Help
FAQsContact UsSubmit a Support Ticket
Social
LinkedIn link
Twitter link
Facebook link
Have a Question?
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Copyright © {auto update year} Gigabit Systems All Rights Reserved.
Website by Klarity
Gigabit Systems Inc. BBB Business Review