Hacks, Malware, Security and Safety

BeckyStrause

Several of our blog posts are regarding staying safe & secure.  This is because every time we turn around there is news about a new hack, attack, or aack! (As in, “Aack, they stole my password!”)

In recent weeks, the New York Times and Wall Street Journal have suffered breaches to their systems.  Twitter discovered an unauthorized attempt to access user data, and concluded that limited data of 250,000 may have been accessed. The Department of Homeland Security encouraged users to disable Java on the browsers because of potential threats.  Internet advertising network NetSeer suffered a hack causing website visitors to be warned that they were visiting was a “known malware distributor.”  Yahoo mail was hacked by an individual who uploaded a video demonstrating how he did it.  With stories like those continually in the news, we want to make sure to keep people aware and educated on security measures.

One security misconception is that if you only go to “trustworthy” websites, you’ll never get malware.  Cisco’s 2013 Annual Security Report has proven that wrong.  Their report states, “Our data reveals the truth of this outdated notion, as web malware encounters are typically not the by-product of “bad” sites in today’s threat landscape. Web malware encounters occur everywhere people visit on the Internet — including the most legitimate of websites they visit frequently, even for business purposes.”

Their point is that malware encounters happen most through Dynamic Content websites and Content Delivery Networks.

  • Dynamic webpage : A dynamic web page is a kind of web page that has been prepared with fresh information (content and/or layout), for each individual.
  • Content Delivery Network : A large distributed system of servers deployed in multiple data centers in the Internet. The goal of a Content Delivery Network is to serve content to end-users with high availability and high performance.

It’s not just the sites selling weight loss pills and fake Rolexes that you have to be concerned about.  Malware attacks are common and becoming more common.  In the argument of “Who’s to blame?” it’s important to understand that most websites are not intentionally serving malware.

Cisco also makes the following points:

The challenge of securing a wide range of applications, devices, and users — whether in an “any-to-any” or Internet of Everything context — is made tougher by the popularity of the cloud as a means of managing enterprise systems.

Addressing security challenges presented by virtualization and the cloud requires rethinking security postures to reflect this new paradigm — perimeter-based controls and old models of access and containment need to be changed to secure the new business model.

As the security experts work on new solutions, we have a few pointers for you:

  • Make sure you are running an active and updated anti-virus program.  This should help with both keeping potential viruses away, and cleaning out malware.
  • Create complex and varied passwords for different sites.  This will help if one of your accounts is ever hacked and someone gets your password.  A hacker may try to sign into various common accounts with the same user name/password combination.  It’s more difficult to hack a more complex password than an easy one.
  • Use multiple email addresses with multiple prefixes for different uses.  For similar reasons as using different passwords.  So if someone gets into your email, you may not automatically be giving them access to all your other information.  Such as, if they get the email address associated with your Facebook but that’s not the one you use to sign into your banking info, your banking info can remain safe.

For more security tips, check out our various blog articles on security, such as:

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers