Key Notes from the Security Team: Q3 2024

Eberly Systems

Focus on integrating with new team members and new customers

This quarter, we highlight:

Awareness 

 

According to the Verizon 2024 Data Breach Investigations Report, 68% of breaches studied involved a human element. Security awareness is a critical part of any organization's security strategy. Having knowledge of security threats and how to spot them continues to become more important for everyone as time goes on. 

 

Recent Security Incidents 

When a large security incident is reported in the news, we have internal discussions on the Eberly Systems team about the details of the attack. We talk through how the attack was carried out, how the company was affected and the damage of the attack. This allows our team to learn about situations we could face in the future and how to prevent them. 

 

Security Presentations 

Bringing awareness to clients with our security presentations is one way we have been improving the security of our clients. At these conferences, we inform clients of up-to-date statistics on cyber attacks and the risks they face in the modern cyber security landscape. We also inform clients on how they can improve their security posture with a 10-step plan. 


An additional side of these security presentations are the more nuanced side of cyber attacks: the economics of the black market. This gives clients a different perspective on why their company could be at risk and what damage they could expect if ever attacked. 

 

Client Communication 

Having strong communication with clients not only builds trust, but also helps clients understand their current risks and how we can remedy some of their attack vectors. In a recent example, we met with the managers of a client company to introduce the importance of security and explain a few steps we would be taking to improve their security posture. Over the following months we implemented key changes around password management and security awareness training. To explain the importance of having these security measures at the client company, we created a presentation showcasing the specifics on how implementation would affect daily work for employees. 

 

Stopping Cyber Events Before they Happen 

Our team saw a few situations in the past quarter where our tools and processes prevented what could have become a significant cyber event. 


During our onboarding of a particular company, a device was found to be infected with malware. Management was informed, and following the proper procedures, the device was safely removed from their environment. Following an investigation, the source of the malware was discovered and the vector used to infect the device. 


In another incident, our security tools identified a business email compromise and locked the account before the attacker could do anything malicious. 


Takeaway 

As always, it is critical that everyone in an organization have a strong awareness of the potential risks of the technology around them. It's important to build a team culture around not being afraid to ask for clarification when in doubt, or for IT to review something before proceeding. 

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems July 9, 2024
Keeping you abreast of security news