Malware

Kordel

In the last week or two I have found myself working on a dizzying number of Mal-ware / Spy-ware infected computers. Two things never cease to amaze me –

1. The fiendish creativity 0f Mal-ware creators and their unscrupulous habit of taking advantage of other peoples gullibility

2. People’s gullibility!

The first thing I tell all of my clients regarding safe and responsible Internet usage is, “If it seems too good to be true, it probably is!” Because lets face it… The Internet is really no different then the rest of the world. It’s full of loan sharks, used car salesmen and pickpockets who have found a more profitable living Online – but they are still trying to push stuff on you, sell you junk and steal from your wallet – only now it’s from the confines of your living room!

In my experience, 49% of infections are from user neglect, 49% are from user gullability, and the remaining 2% are from operating system vulnerabilities. It’s a painful, but sobering truth!

So, for all of my clients, a friendly (and free) word of advice;

– Get an Anti-virus  program, (any – even free ones are fine) and learn how to use it
– Get a Spy-ware scanner and learn how to use it
– Keep both of the above updated regularly
– Don’t believe anything you see if it’s a dream come true. It’s the Internet – someone is trying to take advantage of you!

If that’s too depressing or scary, I’ll gladly buy your computer from you and set you up with a nice, safe typewriter.

Otherwise, take these things into consideration; your car doesn’t drive itself, play the lottery for you, or make contact with foreign diplomats and arrange large cash deposits for you – neither will your computer. Also, your car will not change it’s oil, change it’s breaks, tires or anything else on it’s own. Neither will your computer.

Take care of it, and you’ll have a great Internet ride. Neglect it, and… well, my number is 484-256-3519 and my rates are posted on this site.

Have a nice day.

(P.S. If you read this and feel like I’m writing about YOU, I’m not – EVERY single one of my clients has required Spy-ware service from me – it’s very common, and you’re not alone. That being said, I’m sure each of you can still learn from this. Thank you for your continued patronage!)

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers