Key Notes from the Security Team: Q2 2024

Eberly Systems

Keeping you abreast of security news

Q2 has brought incredible opportunities to Eberly Systems, and with it, new and unique challenges. We are in a season of significant growth, which means applying our security standards across a wider range of technical environments. 

 

Theme of the quarter:

Footprint 

 

In technology, we sometimes use the term “footprint” to refer to the amount of data or exposure an application or an organization has to the outside world. The more ‘stuff’ there is, the larger the footprint. From a security perspective, the more data and systems there are, the more challenging it is to protect. 

 

Our security efforts in recent months have been less about implementing new tools or resources, and more about working to minimize or put proper safeguards around the exposure to various systems for our clients. 

 

Application Whitelisting

In 2024, we see Application Whitelisting as a vital tool to prevent malware and viruses from running. This is effectively a list of approved applications allowed to run on a computer. If something tries to execute on a computer with Application Whitelisting, tools will block the executable from running. In our security incident simulations, we find that Application Whitelisting was the most powerful tool in stopping hacking incidents in their tracks. 

 

 

Auditing Access 

Another key point of exposure for an organization is the number of accounts with administrative privileges. Every user account with local admin rights or even more significantly, with domain or tenant wide admin rights, is a potential entry point for an attacker to take advantage of the account and leverage those permissions in a breach. 

 

We have recently been working on this with several of our clients in order to limit or restructure access that users have to computers and systems. Sometimes this is as simple as giving someone a separate account for administrative actions, or sometimes, we use our advanced security tools to control specific applications and eliminating the need for users to log in directly with an admin account. 

 

 

Evaluating Security Tools 

It's always beneficial to evaluate tools and solutions in order to remain abreast of the newest developments in the security landscape, and this has been one of our main focuses.

 

 

Remediating EOL Systems 

One of the most dangerous risks that businesses assume is running out-of-date software. Whether its an application like Adobe Reader, or an operating system like Windows 8, it is very important to identify these systems and either update them or remove them from the environment. We have seen several businesses experience near-catastrophic events that began from a computer running an unsupported version of Windows. 

 

The Eberly Systems Team has made strides in the past quarter to remove outdated and risky systems from our clients' production networks. This is exactly the kind of thing that minimizes the footprint for an organization. 

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers