8776363957
Connect with us:
LinkedIn link
Facebook link
Twitter link
YouTube link
Gigabit Systems logo
Link to home
Who We AreManaged ServicesCybersecurityOur ProcessContact UsPartners
The Latest News in IT and Cybersecurity

News

A cloud made of diagonal linesA cloud made of diagonal lines
A pattern of hexagons to resemble a network.
Technology
Cybersecurity
News
Must-Read

Is Apple dropping the ball

August 15, 2025
•
20 min read

Is Apple dropping the ball? 🤔📱

Because lately, my iPhone’s talk-to-text has been straight-up chaos.

Mid-sentence—💥—it freezes.

Mic’s on. Nothing types.

The “solution”? Restart the whole phone like it’s 2007.

And when it does work? Buckle up.

I said: “Let’s touch base next week.”

It typed: “Let’s touch bass next week.” 🎸

I said: “Thanks for the quick update.”

It gave me: “Thanks for the thick cupcake.” 🧁

(Not mad about it… just confused.)

I said: “Let’s circle back.”

It heard: “Let’s twerk in the back.” 😳

(…Not the corporate vibe I was going for.)

Apple, you’re supposed to be the gold standard in UX.

How did one of your most helpful features turn into a glitchy improv show?

Anyone else experiencing this?

Drop your funniest talk-to-text fails below.

Let’s make some noise. 🗣💬

AI
Technology
Must-Read

RANT TIME- Google, you broke Gomez superpower

August 15, 2025
•
20 min read

RANT TIME: Google, you broke Gomez’s superpower. 😡

He used to be that guy — the one who could find any photo in seconds.

Birthday in 2017? Found.

Blurry shot of a weird sandwich from that road trip? Boom—3 seconds.

Then came the glorious update:

✨ Google Photos AI Search ✨

Oooh fancy. Sparkles and all.

Except now?

He can’t find anything.

type “wedding” → it shows a dog.

type “camp” → it gives snow.

And the best part? THERE’S. NO. WAY. TO. GO. BACK.

Already tried:

🔄 Deleting the app

🧹 Reinstalling

🛐 Praying

🧠 Even thinking like an AI

But nope. Still lost in the matrix.

Google forced the new AI search down our throats, and I went from search ninja 🥷 to flailing Luddite 📵.

Why do tech companies always “improve” the one thing that worked perfectly?

~~~~~~~~~~~~~~~~~

Dear Google:

Not every upgrade is an improvement.

You overengineered the wheel and gave us a trapezoid.

Let. Me. Go. Back.

Sincerely,

A frustrated ex-photo-wizard who now can’t find his kid’s 3rd birthday pics.

#UXFail #GooglePhotos #AIOverreach #TechGoneWrong #BringBackClassic #UserExperience #TooSmartToBeUseful #SearchShouldJustWork #ProductivityKillers #ProductDesign #InnovationFail

AI
Cybersecurity
Technology
Must-Read

Chips Don’t Lie: How the U.S. Is Tracking AI Hardware

August 13, 2025
•
20 min read

🎯 Chips Don’t Lie: How the U.S. Is Tracking AI Hardware

Hidden trackers in AI servers reveal a growing cyber-geopolitical chess match

What happens when cutting-edge AI chips meant for approved destinations mysteriously wind up in unauthorized Chinese facilities?

You track them.

That’s exactly what U.S. authorities are doing, embedding stealth tracking devices in select AI chip shipments to uncover illegal diversions. According to an exclusive Reuters report, the trackers have been found in Dell and Super Micro shipments containing chips from Nvidia and AMD, with some devices even hidden inside the servers themselves.

This isn’t science fiction. It’s the latest escalation in the battle over semiconductor dominance, and it’s already impacting global tech supply chains.

What This Means for U.S. Businesses

If you’re in healthcare, law, education, or running an SMB—you might think this has nothing to do with you.

Think again.

  • If your IT vendor cuts corners and sources from unauthorized resellers, you may unknowingly use compromised or illegal tech.

  • You’re now part of a supply chain under surveillance.

  • Devices in your server room might carry hidden government trackers — not because you’re guilty, but because the chip passed through a flagged reseller.

The line between global policy and local IT is blurring. You need a compliant, secure MSP who understands the legal, ethical, and cyber implications of your hardware sourcing.

What You Can Do Today

  • Verify your vendors. Know where your servers and components are coming from.

  • Document your hardware inventory and ensure nothing has been tampered with.

  • Work with cybersecurity and IT partners who follow export compliance best practices and don’t cut costs through shady resellers.

  • Ask questions about your servers and cloud systems. If your provider can’t give you clear sourcing answers, find one who can.

70% of all cyber attacks target small businesses. I can help protect yours.

#CyberSecurity #ITCompliance #ManagedServices #SupplyChainSecurity #MSP

Technology
AI
News
Must-Read

Elon Musk is stirring the pot again this time with some very difficult questions for Apple.

August 13, 2025
•
20 min read

Elon Musk is stirring the pot again — and this time, Apple’s in the crosshairs.

Musk claims X is now the #1 news app globally, and his AI chatbot Grok is sitting at #5 among all apps. Yet, neither is featured in Apple’s coveted “Must Have” section of the App Store.

That section isn’t an algorithmic ranking — it’s handpicked by Apple’s editorial team. Which raises the question: if the #1 and #5 apps aren’t in there, what’s the real selection criteria?

Is Apple quietly protecting its brand image by keeping controversial figures and platforms off the list? Is this about politics? Or is it simply how App Store curation has always worked? The truth is, when companies like Apple hold this much influence over what billions of people see, the line between “editorial choice” and “business strategy” starts to blur.

And this isn’t just about Musk or X. It’s about whether tech giants — who act as the gatekeepers of the digital economy — have an ethical responsibility to make these processes transparent. When you control the world’s most valuable digital storefront, should personal bias or political considerations ever play a role?

Because here’s the thing: if being the top-ranked app in your category isn’t enough to secure a spot in “Must Have,” then maybe “Must Have” isn’t about the must-have apps at all. Maybe it’s about the must-have image Apple wants to project.

The bigger question for every business leader, entrepreneur, and innovator is this: if your growth can be stalled or your reach throttled simply because you don’t align with a curator’s values, how do you build a business in that environment? Is that just competition — or quiet censorship in disguise?

One thing’s for sure — this conversation is going to get louder. And how Apple responds (or doesn’t) could set a precedent for the future of app discovery.

Technology
Cybersecurity
News
Science

End of an Era for Dial-Up

August 11, 2025
•
20 min read

End of an Era for Dial-Up

After 34 years, AOL will officially pull the plug on its dial-up internet service on September 30, 2025 — taking with it the AOL Dialer software and AOL Shield browser. Once the gateway to the World Wide Web for millions, the service’s iconic screeching connection tones will fade into history.

While only around 250,000 U.S. households still rely on dial-up, the shutdown highlights a reality: legacy systems are vanishing, and with them, some users’ only connection to the internet. For those in rural or hard-to-reach areas, satellite internet and emerging 5G home solutions will be the likely replacements.

It’s a reminder for both individuals and businesses to stay ahead of tech obsolescence — because the tools you depend on today may not exist tomorrow. Planning for transitions in advance ensures continuity, whether it’s your internet connection or critical business systems.

70% of all cyber attacks target small businesses, I can help protect yours.

Technology
Cybersecurity
Must-Read
News

Hackers Hit Healthcare: DaVita Breach Exposes Over 900,000 Patients

August 6, 2025
•
20 min read

Hackers Hit Healthcare: DaVita Breach Exposes Over 900,000 Patients

A major ransomware attack has rocked the healthcare sector yet again — this time targeting DaVita, one of the largest kidney dialysis providers in the U.S.

What Happened?

Hackers gained unauthorized access to DaVita’s servers in late March 2025, breaching primarily its lab infrastructure. While DaVita discovered the intrusion in mid-April, a staggering amount of sensitive data had already been exfiltrated.

The Interlock ransomware group has claimed responsibility, boasting it stole 1.5TB of data — including more than 683,000 files. Comparitech reports that over 900,000 individuals may be affected.

What Was Stolen?

DaVita’s investigation reveals that the stolen data varies from person to person, but can include:

  • Full names and addresses

  • Dates of birth and Social Security numbers

  • Health insurance and medical treatment details

  • Tax identification numbers

  • Images of checks sent to DaVita

This isn’t just a data breach — it’s a catastrophic violation of trust and privacy, particularly damaging because it involves healthcare information, which is among the most difficult data to recover from once compromised.

Why This Matters

Cybercriminals continue to target healthcare providers for one reason: the data is rich, sensitive, and highly profitable on the dark web. And unlike a stolen credit card, medical records and SSNs can’t simply be reissued.

This breach adds DaVita to a growing list of healthcare organizations that have faced ransomware attacks in recent years — highlighting the urgent need for layered cybersecurity defenses and employee awareness training in critical infrastructure sectors.

What To Do If You’re Affected

DaVita has started mailing data breach notification letters. If you or a loved one received one, take these actions immediately:

  • Freeze your credit with all three major bureaus

  • Sign up for identity theft protection (DaVita may offer this for free)

  • Monitor medical billing statements for signs of fraud

  • Report suspicious activity to the FTC’s identity theft site: identitytheft.gov

70% of all cyber attacks target small businesses. I can help protect yours.

Must-Read
Cybersecurity
News
Tips
Technology

MFA or Pay the Price

August 3, 2025
•
20 min read

MFA or Pay the Price

Hamilton just got handed an $18.3M cybersecurity bill.

Why? Their insurer denied the claim. The reason? No MFA.

A Wake-Up Call for Every Organization

In February 2024, the City of Hamilton fell victim to a devastating ransomware attack. 80% of their network went dark. Transit, tax processing, fire department records—wiped or frozen.

The attackers demanded $18.5 million. The city refused to pay.

Smart move ethically. But still: the recovery cost was nearly the same.

And then came the second gut punch:

The insurance company denied coverage due to a lack of Multi-Factor Authentication (MFA) — a basic security control.

“We Have Insurance” Isn’t a Security Strategy

Cyber insurance is not a substitute for cybersecurity.

It’s a safety net — but only if your organization follows best practices.

Many policies now require MFA, endpoint protection, user training, and regular patching.

Fall short? You’re on your own.

What Does This Mean for SMBs, Schools, Law Firms, and Clinics?

If a major Canadian city can be devastated by an overlooked MFA rollout, imagine what one missed step could cost a smaller organization.

  • Schools hold sensitive student data

  • Healthcare providers store PHI

  • Law firms manage confidential client communications

One breach could wreck more than your systems. It could destroy trust — and your bottom line.

5 Takeaways You Can’t Ignore

  1. Implement MFA — on all cloud services, email accounts, and admin portals

  2. Test your backups — don’t assume they’re working

  3. Train your users — phishing is still the #1 attack vector

  4. Know your insurance policy — do you meet the requirements?

  5. Partner with a cybersecurity-first MSP — like Gigabit Systems

70% of all cyber attacks target small businesses, I can help protect yours.

#Cybersecurity #ManagedIT #MSP #Ransomware #SMBSecurity

Technology
Cybersecurity
Must-Read
Tips

Too Late to Insure a Burning House

July 30, 2025
•
20 min read

🔥 Too Late to Insure a Burning House

“Can you do cybersecurity… without the ongoing stuff?”

A client once asked us that. It’s like saying: “I want insurance—just when my house is on fire.”

Why Cybersecurity Can’t Be a One-Time Fix

Cybersecurity isn’t a fire extinguisher. It’s a sprinkler system.

Hackers don’t wait for your annual checkup—they look for cracks daily.

Yet many small businesses, law firms, schools, and even healthcare practices still treat cybersecurity as a checkbox:

  • A one-time antivirus install

  • A firewall from five years ago

  • “We’re too small to be a target”

Reality check: 70% of cyber attacks target small businesses. Most never see it coming until it’s too late.

What “Ongoing” Really Means

At Gigabit Systems, ongoing doesn’t mean “endless bills.”

It means:

  • Real-time monitoring of threats

  • Patching vulnerabilities as they emerge

  • Simulated phishing tests to train staff

  • Backups that actually work when disaster strikes

It’s not overkill. It’s survival.

If you wouldn’t drop your health insurance just because you feel okay this month, why gamble with your business?

Think Like a Hacker

Hackers don’t care if your firm has 5 users or 500.

They just want:

  • One stolen email login

  • One unpatched device

  • One distracted employee

Ongoing cybersecurity isn’t a luxury.

It’s the difference between a near-miss and a headline.

70% of all cyber attacks target small businesses, I can help protect yours.

Must-Read
Technology
Science
Cybersecurity
News

Even spy agencies are getting hacked.

July 30, 2025
•
20 min read

Even spy agencies are getting hacked.

Hackers have breached a top-secret portal used by the CIA and other intelligence agencies to manage sensitive contracts, raising serious alarms across the national security landscape. The compromised site, the Acquisition Research Center, is run by the National Reconnaissance Office (NRO), which oversees the U.S. spy satellite program.

Sources familiar with the breach say data from Digital Hammer, a classified CIA initiative, was exposed — along with proprietary intelligence technologies and personal information submitted to support covert operations. The full extent of the breach is still unknown, but insiders suggest the compromise could stretch into programs tied to Space Force surveillance and missile defense efforts, including the Golden Dome.

This breach comes on the heels of another sobering disclosure: Chinese state-backed hackers accessed systems inside the Department of Energy’s National Nuclear Security Administration, the central hub of the U.S. nuclear arsenal.

This isn’t just a federal problem. It’s a loud and clear warning for every business with sensitive contracts, vendor portals, or IP. If cybercriminals can infiltrate intelligence networks and nuclear agencies, what’s protecting your organization?

Supply chain targeting is one of the fastest-growing forms of cyberattack. Hackers don’t always go after the fortress — they go after the vendor with a side door. That could be your company, especially if you provide services to schools, law firms, healthcare clinics, or government contractors.

Cybersecurity is no longer about perimeter firewalls or reactive fixes. You need real-time monitoring, hardened endpoint security, and a zero-trust model that assumes every login could be a threat.

The breach of America’s most secretive platforms shows how high the stakes are. The question isn’t if your business will be tested — it’s whether your defenses are ready when it happens.

70% of all cyber attacks target small businesses. I can help protect yours.

Next
About
Managed ServicesCybersecurityOur ProcessWho We AreNewsPrivacy Policy
Help
FAQsContact UsSubmit a Support Ticket
Social
LinkedIn link
Twitter link
Facebook link
Have a Question?
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Copyright © {auto update year} Gigabit Systems All Rights Reserved.
Website by Klarity
Gigabit Systems Inc. BBB Business Review