8776363957
Connect with us:
LinkedIn link
Facebook link
Twitter link
YouTube link
Gigabit Systems logo
Link to home
Who We AreManaged ServicesCybersecurityOur ProcessContact UsPartners
The Latest News in IT and Cybersecurity

News

A cloud made of diagonal linesA cloud made of diagonal lines
A pattern of hexagons to resemble a network.
Tips
News
Cybersecurity

Safeguarding Our Children in the Digital Age: A wake up call for Parents

November 5, 2024
•
20 min read

Safeguarding Our Children in the Digital Age: A wake up call for Parents post 4/5

As we navigate the complex digital landscape, our children's safety online remains a paramount concern. While the sharing of photos and videos online has become commonplace, it's crucial for parents to recognize both the overt and subtle risks associated with this practice.

Obvious dangers lurk in the form of predators who may use shared images to target children. These individuals can manipulate children by gleaning personal information from images (like school logos or location details) and pretending to be someone they trust.

The less obvious peril is the psychological impact of social media on teens. The quest for likes and validation can lead to anxiety, depression, and a distorted sense of self-worth. Children, in their formative years, are particularly vulnerable to this digital validation loop, which can have long-term detrimental effects on their mental health.

Strangers may also manipulate children by using the gathered data to create trust or by fabricating emergencies to elicit personal information or inappropriate content from the child.

Moreover, AI technology has become so advanced that parents can be deceived by realistic, yet false, scenarios suggesting their children are in danger. Deepfakes and voice synthesis can create convincing messages or images that prey on a parent's deepest fears, potentially leading to rash decisions or data breaches.

To combat these risks:

- Educate your children about the value of privacy and the power of personal information.

- Utilize privacy settings and parental controls available on social platforms and devices.

- Encourage healthy, open conversations about the emotional impacts of social media.

- Verify any alarming information through direct, secure communication with your child or their school.

Our role as parents in the digital era is not just to protect, but to prepare our children to navigate online spaces with awareness and resilience. Let's take proactive steps to ensure that the digital footprints they leave lead to a path of safety and well-being.

#ChildSafety #OnlineSafety #ParentingInDigitalAge #CyberSecurity #MentalHealthAwareness #data

Cybersecurity
News
Tips

A Comprehensive Approach to Online Safety for Parents

November 2, 2024
•
20 min read

A Comprehensive Approach to Online Safety for Parents - Post 2 of 5.

As parents in the digital age, our role is to be the architects of a secure online framework for our children. This task involves more than just setting rules; it means actively engaging with our children's digital world and empowering them to make safe choices. Here’s a detailed guide to fostering a protected online environment for your kids:

1. Secure Devices and Privacy:

Equip all devices with robust passwords and current security software to safeguard against cyber threats. Teach your children about the dangers of sharing personal information, and ensure privacy settings are configured to the highest level on social platforms and apps.

2. Implement Content Filters and Safe Searches:

Leverage parental controls to block inappropriate content on devices and home networks. Use filters like Google SafeSearch and enable safe modes on video streaming sites like YouTube. Consider network-level filters that work across all devices at home.

3. Establish Screen Time Protocols:

Create a balanced digital diet with designated screen-free times, especially during meals and before bedtime. Use tools such as Apple's Screen Time or Android's Family Link to set time limits on apps and overall device usage.

4. Promote Digital Literacy and Etiquette: Regularly discuss the nuances of the digital world, emphasizing the importance of empathy, privacy, and the impact of one's digital footprint. Encourage your children to treat others with respect online, just as they would in person.

5. Craft a Family Technology Agreement: Involve your children in creating a set of guidelines for online behavior and screen use. This agreement could cover aspects like the types of websites that are off-limits, the amount of screen time allowed per day, and the importance of not engaging with strangers online.

6. Foster Critical Thinking:

Educate your children on identifying trustworthy sources online to combat misinformation. Encourage them to question what they see online and come to you with questions.

7. Regularly Update Safety Measures:

Stay informed about the latest in online safety and adjust your strategies accordingly. This might mean updating filters, changing passwords, or having fresh conversations about new social media trends.

8. Encourage Healthy Online Habits: Promote activities that foster creativity and learning, such as educational apps or websites that teach new skills.

By fostering open dialogue, setting clear expectations, and using the right digital tools, we can create a safer online environment for our children. Let's take these steps together, empowering our children to become savvy, ethical, and thoughtful digital citizens.

#leadership  #technology #education #data

Tips
Cybersecurity
News

A parent's guide to navigating the digital age with their children

November 1, 2024
•
20 min read

A parent's guide to navigating the digital age with their children -  4 conversations you must have.  Post 1 of 5.

As the digital landscape evolves, online safety has emerged as a crucial conversation every parent must have with their children. With the proliferation of social media, gaming platforms, and educational tools, our kids are exposed to a vast array of content and interactions, making it imperative to guide them on navigating these spaces safely.

The key is to foster an open dialogue that encourages children to share their online experiences, including any uncomfortable or alarming situations. It's essential for parents to educate themselves about the latest online trends and potential risks, such as cyberbullying, privacy breaches, and contact with strangers. By doing so, they can offer relevant and practical advice to their children.

Creating a set of family rules for internet use can provide clear guidelines for what is acceptable and what is not. For example, you might set rules around keeping personal information private, being respectful online, and what to do if they encounter something that makes them feel uneasy.

Additionally, using parental controls and monitoring tools can help, but the foundation of online safety lies in trust and communication. Teaching critical thinking skills is also vital, as it empowers children to discern the credibility of online information and the intentions of digital communication.

Parents, your proactive approach to discussing online safety will equip your children with the knowledge and skills they need to protect themselves and make informed decisions in the digital world. Let's prioritize these conversations to ensure the internet remains a positive and safe space for our children to learn, create, and connect.

During the next few days I’m going to focus on some specific cyber safety concerns that parents should focus on.

  • Safeguarding devices and implementing screen time

  • Online cyber bullying

  • Posting videos and pictures online

  • Chatting with friends (that are strangers)

If there is a specific topic that you would like me to cover, please drop it in the comments.

#OnlineSafety #Parenting #DigitalLiteracy #FamilyRules #cybersecurity

Tips
News
Cybersecurity

Is TikTok Making Young Americans Turn Against Their Own Country?

October 12, 2024
•
20 min read

Is TikTok Making Young Americans Turn Against Their Own Country?

TikTok has captured the attention of millions of young Americans, but its ownership by ByteDance, a Chinese company, has sparked growing concerns about national security and ideological influence. At the heart of the issue is the platform’s powerful algorithm, which shapes the content users see. Some fear that TikTok is doing more than just serving entertaining videos—it may be subtly fostering anti-American sentiment among its young audience.

Here’s the concern: ByteDance operates under Chinese law, meaning it could be compelled to cooperate with the Chinese government. Whether intentional or not, there is the risk that TikTok’s algorithm could be used as a soft power tool to amplify content that promotes disillusionment with American democracy, capitalism, and social institutions. The platform can reinforce negative views by repeatedly showing polarizing or critical content—leading young people to question the values that hold American society together.

Why Does This Matter?

🔹 Algorithmic Influence on Ideologies: Content that subtly criticizes American institutions or promotes distrust can shape users’ views over time, leading them to feel disconnected or even hostile toward their own country.

🔹 Echo Chambers and Polarization: Young users could get stuck in cycles of negative content, making them feel that America is irreparably broken. The more disillusioned they feel, the easier it becomes for foreign influences to undermine social unity.

🔹 Cultural Impact: Social media influences how young people perceive the world and their place in it. If TikTok promotes the narrative that American ideals like freedom, equality, and democracy are meaningless or flawed, it weakens national identity and civic engagement.

🔹 Hidden Bias and Control: With opaque moderation practices and algorithms, TikTok’s influence is hard to monitor. This creates opportunities for foreign interests to shape narratives in ways Americans might not even notice.

A Subtle but Serious Threat

Even if ByteDance isn’t explicitly pushing an agenda, the potential for ideological manipulation is real. When a foreign entity with ties to an authoritarian regime controls a platform that shapes the views of millions of young Americans, we must ask: What ideas are we allowing to take root in the minds of our next generation?

TikTok may be fun and creative, but the risks are too significant to ignore. We need to educate users and demand transparency to ensure foreign-owned platforms aren’t quietly steering our youth to reject their own values. The future of America’s national identity depends on it.

What do you think? Are these concerns legitimate, or are they overblown? How do we balance fun with vigilance in the digital age?

====================================

Follow me for mind blowing information and cybersecurity news. Stay safe and secure!

====================================

#TikTok #NationalSecurity #IdeologicalInfluence #Youth #SocialMedia #DataPrivacy #Polarization #SoftPower #AmericanValues

Cybersecurity
News
Tips

Keep your kids away from social media.

July 18, 2024
•
20 min read

Keep your kids away from social media.

Lawsuits Mount as Long Island School Districts Challenge Social Media Giants

In an unprecedented legal action, more than a dozen school districts from Long Island have initiated lawsuits against major social media platforms such as TikTok, Facebook, Instagram, and Snapchat. This collective legal challenge represents a significant stand by educational institutions against what they perceive as the negative impacts of social media on students’ mental health and well-being.

The plaintiffs, including South Huntington, Kings Park, and Jericho districts, among others, are advocating for accountability from these tech giants, citing increased spending on mental health services necessitated by the social media-induced distress among students. These districts allege that the platforms contribute to physical pain, mental anguish, and a diminished enjoyment of life among students.

Port Jefferson School District, as voiced by Superintendent Jessica Schmettan, emphasized the lawsuit’s role in advancing child safety and raising awareness about the addictive nature of social media. The district aims to spark a broader recognition of the need for regulatory measures to safeguard young users.

This lawsuit aligns with wider concerns about the role of social media in fostering environments conducive to bullying and exclusion. Joseph Salamone, founder of the Long Island Coalition Against Bullying, noted the pervasive influence of mobile devices in amplifying negative interactions among students.

As the legal proceedings gain momentum, the involved school districts hope their actions will catalyze significant changes in how social media platforms manage and mitigate their impact on young users. Meanwhile, a spokesperson from Meta reassured that the company is deeply committed to ensuring safe online experiences for teens, highlighting the various tools and features developed to protect young users on their platforms.

#socialnetworking  #MentalHealthAwareness #LegalAction #Education #Cyberbullying Prevention #technology

Tips
Cybersecurity
News
AI

Cybercriminals are now using AI-generated TikTok videos to trick users, especially teens

June 27, 2024
•
20 min read

If it sounds too good to be true… it’s probably malware.

Cybercriminals are now using AI-generated TikTok videos to trick users — especially teens and young adults — into installing malware on their own computers.

The pitch?

“Type this one PowerShell command and get Spotify Premium or Windows Pro for free.”

The result?

You just installed an infostealer that silently siphons your passwords, documents, crypto wallets, and social media logins. Some victims even reported their entire hard drives wiped.

What makes this attack so effective?

🚨 No phishing links.

🚨 No suspicious email attachments.

🚨 Just a video with a robotic AI voice and a step-by-step guide.

It slips past antivirus software.

Because there’s no malicious file — you become the delivery mechanism.

Trend Micro’s researchers uncovered this, but by then millions had already watched. Some videos reached over 500,000 views. And TikTok, to its credit, has taken them down — but not before damage was done.

This is the next evolution of social engineering:

AI-powered. Visually convincing. Mass-distributed.

If you’re not educating your teams, your clients, and your kids about this — you’re already behind.

Curiosity and greed will always be exploited.

Cybersecurity awareness is your best defense.

==================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

==================================

#CyberSecurity #SocialEngineering #TikTokScam #Malware #Infostealer #AIAwareness #SecurityEducation

Cybersecurity
News
Tips

Chinese Hackers Are Turning Smartphones Into Espionage Tools1

June 26, 2025
•
20 min read

📱 Chinese Hackers Are Turning Smartphones Into Espionage Tools — FBI Warns of Mobile Security Crisis

A silent breach. No clicks. No downloads. Just a crashed phone — and full surveillance access.

That’s how investigators at cybersecurity firm iVerify described a sophisticated cyberattack campaign targeting smartphones belonging to journalists, government officials, and tech executives.

The source? According to U.S. officials, it points to China’s state-backed hacking apparatus.

“The world is in a mobile security crisis right now. No one is watching the phones.”
— Rocky Cole, former NSA and Google cybersecurity expert

What’s Happening?

The FBI and cybersecurity researchers have identified an ongoing wave of mobile cyberattacks tied to China’s military and intelligence services. Key findings:

🔍 Zero-click infiltration: Phones were infected without user interaction

📱 Mobile targets: Prominent Americans in politics, journalism, tech, and government

🎯 Objective: Real-time surveillance — voice, texts, and app activity

📡 Breach entry: Malicious apps, spoofed links, telecom backdoors, and unpatched IoT

Victims include campaign officials from the 2024 U.S. election, national security aides, and even Trump’s running mate JD Vance.

What’s at Stake for Businesses, Law Firms, Schools, and Clinics?

While this campaign targets high-profile figures, the attack surface applies to everyone:

  • Executives and attorneys store confidential communications on phones
  • Healthcare providers use mobile devices for telehealth, EHR access, and compliance alerts
  • Schools and staff rely on BYOD and unsecured mobile apps
  • SMBs often lack mobile device management (MDM) or app-level protections
One compromised phone = compromised network, contacts, credentials, and more.

The Bigger Risk: User Lapses

Even with encrypted apps like Signal, investigators found critical human errors:

  • Sensitive discussions on personal devices
  • Signal chats including the wrong contacts
  • Pentagon officials bypassing security for convenience
  • No verification of spoofed messages from fake staffers
“It doesn’t matter how secure the device is if the user doesn’t follow basic protocols.”

8 Things You Must Do Right Now

At Gigabit Systems, we help organizations secure mobile endpoints with zero-trust protection. Start here:

✅ Enforce Mobile Device Management (MDM)

✅ Block unauthorized apps and sideloading

✅ Educate users on spoofing, phishing, and social engineering

✅ Require MFA for mobile app access

✅ Patch phones, apps, and IoT firmware regularly

✅ Remove outdated or unused apps

✅ Restrict sensitive work from personal phones

✅ Avoid messaging platforms not approved for secure data

If mobile devices are now the front line of cyber warfare—who’s guarding yours?

👇 Comment if your organization uses smartphones for critical data access.

🔁 Share this with leadership or staff who may be unaware of the mobile threat landscape.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

Because 70% of all cyberattacks target small businesses—

I can help protect yours.

‍

‍

#CyberSecurity #MobileThreats #ChinaHackers #Infosec #ManagedITServices

‍

Cybersecurity
News
Tips

You don’t need a military budget to defend against this

June 26, 2025
•
20 min read

Digital War Games: Iranian Hackers Aim for U.S. Soft Targets

The bombs hit Iran’s bunkers — now their hackers are targeting ours.

In the wake of U.S. airstrikes on Iranian nuclear facilities, Iranian-backed hackers have begun launching cyberattacks on American banks, defense contractors, and oil and energy firms. While no widespread infrastructure damage has occurred yet, the warning lights are flashing: we’re not just in a kinetic conflict — we’re in a digital one.

Denial-of-service attacks have already been claimed by pro-Iranian groups. But intelligence agencies are warning that more aggressive activity is imminent — and it won’t just hit the big guys.

Small businesses are the perfect target.

Iran’s cyber strategy has always thrived on disruption, fear, and asymmetric warfare. Their playbook includes psychological operations, data theft, and digital espionage. They’re not always aiming to destroy — sometimes, they just want to show they can.

And that’s exactly what makes small and mid-sized businesses vulnerable.

A New York law firm.

A suburban school district.

A medical billing service in Ohio.

An HVAC company managing building controls for 30 sites.

Each of these represents a high-value, low-defended gateway into larger ecosystems — and that’s exactly what today’s threat actors are looking for.

This is not theory. It’s happening now.

CISA has issued alerts. The Department of Homeland Security has flagged an “elevated threat environment.” And more than 60 Iranian-affiliated groups — ranging from formal military units to rogue hacktivists — are already in motion.

But most small businesses haven’t responded. Many haven’t even heard.

Here’s what should worry you:

  • Iran has used emergency alert systems to trigger false missile warnings.

  • Hackers have impersonated executives, redirected payroll, and stolen legal records.

  • Spear phishing campaigns are actively harvesting credentials from small orgs.

  • Infrastructure providers and supply chain vendors are being quietly surveilled.

This is no longer about “maybe.” The digital front line now includes your office.

What should you do today?

  • Implement multi-factor authentication (MFA) across every system — especially email and payroll.

  • Require admin approval for all financial transfers.

  • Check your logs and SIEM dashboards for unusual activity.

  • Update, patch, and restrict access to critical software.

  • Train staff on phishing detection — not once a year, but right now.

You don’t need a military budget to defend against this. But you do need to act.

America may win in the air. But in cyberspace? The battle’s just beginning — and small businesses are directly in the crosshairs.

====================================

Follow me for mind-blowing information and cybersecurity news. Stay safe and secure!

70% of all cyber attacks target small businesses, I can help protect yours.

#cybersecurity #MSP #IranianHackers #infosec #databreach #criticalinfrastructure #ransomware #smallbusiness

News

Did the Massive Bunker Busters work

June 25, 2025
•
20 min read

America Drops Massive Bunker Busters on Iran — But Did They Work?

In a dramatic escalation of the ongoing conflict between Israel and Iran, the United States launched “Operation Midnight Hammer” over the weekend, marking the first-ever use of its 30,000-pound Massive Ordnance Penetrator (MOP) in combat. These bunker-busting bombs were dropped by B-2 stealth bombers on three of Iran’s most fortified nuclear sites: Fordow, Natanz, and Isfahan.

While former President Trump declared the operation a complete success, early satellite imagery and U.S. intelligence suggest otherwise — indicating the attack may have only set Iran’s nuclear program back by a few months.

The Bomb vs. the Bunker

This high-stakes confrontation highlights a less visible but critical arms race — not between nations, but between materials: steel versus concrete.

For decades, military engineers have been refining bunker-busting weapons. Modern penetrators are made from hardened alloys like Eglin Steel, designed to punch through reinforced targets with minimal explosive payloads. But Iran, as well as other military powers, has been investing in the opposite side of the equation: Ultra High Performance Concrete (UHPC), a fiber-reinforced material capable of withstanding 40,000 psi — far beyond the strength of conventional concrete.

Military insiders believe that Iran’s underground bunkers may be fortified with UHPC or even more advanced layered concrete technologies such as Functionally Graded Cementitious Composite (FGCC), which combines hard outer shells, energy-absorbing middle layers, and anti-spall inner coatings. If confirmed, this would help explain the MOP’s limited effect on the nuclear facilities.

A History of Escalation

This isn’t the first time U.S. bunker-busting technology has been challenged. During the Gulf War in 1991, Iraq’s heavily fortified command centers required a crash program to build stronger bombs — leading to the infamous 5,000-pound BLU-113. Today’s MOP is the spiritual successor, and at 30,000 pounds, it’s nearly the largest weapon the U.S. can drop without resorting to nuclear payloads.

However, experts warn that even the MOP may not be enough.

Where Does the Arms Race Go From Here?

As military concrete gets tougher, steel-based bomb casings are hitting their physical limits. The future may lie in hypersonic penetrators — non-explosive missiles made from tungsten or similar materials, relying purely on kinetic energy to crack through hardened targets at speeds exceeding Mach 5. Some call them “rods from God.”

Alternatively, soft-target strategies may dominate. Rather than penetrate a bunker directly, attackers might aim to destroy entrances, communications lines, or surrounding infrastructure — rendering the facility inoperable without needing to physically break through.

Final Thoughts

Whether Iran’s bunkers survived the weekend’s attack remains unclear. But one thing is certain: in the shadowy competition between bombmakers and bunker builders, neither side holds permanent advantage. As concrete becomes “smarter” and more resistant, and as weapons systems evolve in size, material, and velocity, the balance continues to shift.

The world is watching — not just for explosions, but for what comes after the dust settles.

Previous
Next
About
Managed ServicesCybersecurityOur ProcessWho We AreNewsPrivacy Policy
Help
FAQsContact UsSubmit a Support Ticket
Social
LinkedIn link
Twitter link
Facebook link
Have a Question?
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Copyright © {auto update year} Gigabit Systems All Rights Reserved.
Website by Klarity
Gigabit Systems Inc. BBB Business Review