CVEs Swept Under Rug

CVE Management: Removing CVEs Swept Under the Rug

IT leadership builds and manages strong, diverse teams to ensure secure and stable operations. However, sometimes departments overlap resulting in confusion and miscommunication. Such is the case with networking and security departments when it comes to CVE management. It is important to address responsibility early on. Who should be held accountable for any unpatched known vulnerabilities generated by networking tools? 

The Nature of Why CVEs Go Unpatched

Organizations spend an incredible amount of time and money to secure their digital landscape. Even the strongest offensive strategy cannot fully protect an organization against publicly known vulnerabilities. Unpatched CVEs leave well-known entrance points into an otherwise secured environment. Unmitigated vulnerabilities lead to havoc-wreaking breaches that cost millions of dollars in damage.  

The most obvious response is to quickly patch the known vulnerabilities before it is used as an entrance point. The challenge is that patching CVEs can be very time-consuming and expensive while also requiring scheduled downtime. Keeping up with patches can be an impossible task when there are many vulnerabilities or confusion on which department holds responsibility.  

Who is Responsible for Networking CVEs?

CVEs produced by networking tools can be considered the responsibility of either the networking team or security team: the networking team because they are the owner of the toolset and the security team because of the vulnerability to the organization. This often results in a dispute over which department is responsible for the tracking and patching of critical CVEs. Departments may shuffle them back and forth or sweep them under the rug completely. This is often the case when there is an exorbitant number of CVEs. 

One team ideally takes ownership of the often-daunting task to ensure CVEs are properly handled. The good news is that there is a way to significantly reduce the number of vulnerabilities making CVE management easier for either team.  

Arista Cloud Networking – The Solution to Fewer CVEs

Ease the pain of CVE mitigation by selecting a networking solution that has a low annual number of CVEs. In 2021, there were over 600 created CVEs just for Cisco products alone. That same year a data-driven cloud networking technology provider named Arista had only 12 CVEs. Having 50x fewer CVEs translates to far fewer being swept under the rug and an increased security posture.  

Arista dedicates resources to extensive development and testing. The end result is a significantly more stable product, a manageable number of CVEs and minimized security risk.   

In Conclusion

CVE detection is only half the battle. Mitigation is the other half. A CVE vulnerability can turn into a threat if left unmitigated. Even worse, it could turn into an actual cyberattack. Luckily the epic battle between CVE detection and remediation can be eased by selecting a new generation of networking solution like Arista. Extensive testing prior to release and low annual CVE counts allows either networking or security teams to have a chance at full repair.  

5G in Public Safety

Embracing 5G in Public Safety – On-demand Webinar

Officers, firefighters and paramedics alike need secure, reliable and fast communications. They rely on one router to connect the increasing number of critical devices in their vehicle back to HQ. That’s where Sierra Wireless comes in with three of its newest XR devices using 5G for public safety. 

This on-demand webinar keeps public safety viewers up to date with the changing wireless environment by exploring: 

  • 5G’s frequency bands and coverage they each offer. 
  • Sierra Wireless’ new XR90, XR80 and XR80 LTE routers. 

5G in Today’s Marketplace 

5G is the fifth generation of wireless technology and offers the fastest speeds yet. 5G providers offer services in a combination of spectrums. We’ll take a closer look at high-band, mid-band and low-band and explore what each provides. 

High-band: Also called millimeter wave (mmWave), this band includes frequency of 24 GHz and higher. It is compatible only with 5G technology and it the next iteration of cellular service. High-band allows for mission-critical information like video footage to uploaded 10x faster than previous generations of technology. The higher frequency does not travel as far as other bands and is most populated in dense and congested areas. 

Mid-band: This includes frequency bands between 1 GHz to 6 GHz. It provides good speed and reliable coverage over significant distances. This is in part due to its improved penetration through structures. Mid-band is often deployed to bridge the gap between high-band and low-band spectrums for smooth speed and coverage. Mid-band at upper frequencies can be compatible with both 4G and 5G technology while the lower frequencies are compatible with 2G, 3G, 4G and 5G networks.  

Low-band: This includes frequency bands in the 600 MHz to 1 GHz range. It provides low speed with widespread coverage and easy penetration through windows and walls. Low-band is commonly deployed in critical infrastructures such as wind farms or the gas and oil industry. Low-band is compatible with 2G, 3G, 4G and 5G networks. 

Sierra Wireless’ 5G Updates

The latest Sierra Wireless XR routers are compatible with 5G to ensure departments are ready for the future of connectivity. 5G devices enable faster throughput speeds, more capacity, better latency and higher bandwidth once 5G service is activated. Any of these products give departments a strategic position to capture what they need today as well as in the future.  

XR 90: A single or dual carrier 5G enabled router that is compatible with AT&T, T-Mobile and British Telecom networks. View Spec Sheet 

XR 80: A single or dual carrier 5G enabled router that is compatible with AT&T and T-Mobile networks. View Spec Sheet 

XR80 LTE: A single carrier 4G enabled router with optional dual LTE cellular. View Spec Sheet 

The wireless environment is ever-changing. Stay up to date with the latest technology trends so your department is the best – and safest – it can be.  

Watch now to further explore how 5G enabled Sierra routers can benefit your fleet. 

 

Ready for more information on 5G enabled devices? Visit Brite’s Communication page. 

Comparing tech with CVEs

Comparing Technology Solutions with CVEs

Your organization has a well-planned security strategy. The perimeter and devices are protected. End users are trained. Critical data is safeguarded. With the immense effort and expense of securing an environment, why would anyone still leave the metaphorical front door open to known vulnerabilities? The ease of use of the MITRE Corporation’s publicly available CVE (common vulnerabilities and exposures) database makes it easy to identify cracked doors to your network. CVEs can also be used to compare how stable different technology solutions are.

What is a CVE?

A CVE is a known software flaw accompanied by a description and an ID number. The goal of the CVE database is to provide a readily available list of cybersecurity vulnerabilities for organizations to reference and ultimately patch. However, the list itself does not offer information on fixes, risks or impacts. CVEs are all about awareness of detection vulnerabilities. 

The Impact of Unpatched CVEs

Every CVE needs to be patched. Patching requires planning resources and scheduled downtime. It can be very time-consuming and expensive when there are a considerable number. The front door is left open and security plans are undermined when CVEs are not patched quickly. Ultimately, the more unpatched CVEs an organization has, the less secure the organization is. 

Using CVEs to Compare Technology Solutions

Consider this: A less than scrupulous provider may choose to release new technologies to the market without thorough testing. This results in more CVEs and a need for more patches down the line. On the other hand, a security-focused provider will wait to launch a product until it has been thoroughly developed and tested. That means less vulnerabilities and fewer patches.  

Keep in mind that hitting a 0% CVE rate is next to impossible because new CVEs come out on a weekly basis. To make your infrastructure as secure as possible, select a technology provider with a low number of annual CVEs. 

Networking Tools – A Common Cause of CVEs

Networking tools have historically been notorious for causing CVEs. The most common networking vendor produced over 600 CVEs in 2021 alone.  

Arista tells a completely different story with its data-driven cloud networking solution. Arista had only 12 CVEs created for the entirety of 2021 – far less than the leading competitor had in an average month. The stark difference in CVE count displays Arista’s emphasis on development and testing. Facing only 12 networking CVEs for the year means teams can easily manage remediation.  

The bottom line – a manageable number of known vulnerabilities translates to swift patching and increased overall security. Select your networking toolset wisely. 

In Conclusion 

CVEs are an important part of cybersecurity vulnerability management. Networks will be stronger and more secure if an organization has fewer CVEs. Compare CVEs and partner with a networking provider that has a low annual number for increased network security and stability. 

Ready for a more secure networking solution? Learn how Arista can benefit your business

FirstNet MegaRange for Departments

Does Your Department Need FirstNet MegaRange?

Many departments have expanded coverage and increased reliability with help from FirstNet MegaRange. It sounds like a great addition – but does your department really need it? To answer this question you must first fully understand the details of FirstNet MegaRange. 

What is FirstNet MegaRange?

Built by AT&T, FirstNet was originally created as a dedicated broadband communications platform for public safety and first responders. While occasionally used commercially, FirstNet’s purpose has pretty much remained the same – to be used for public safety and first responders. By early 2021, new high-power user equipment (HPUE) was created to work on the Band-14 spectrum on the FirstNet platform. The HPUE was dubbed FirstNet MegaRange and it has been making a name for itself by transmitting stronger signals and significantly improving uplink data speeds. 

What’s So Great About FirstNet MegaRange?
Why is an HPUE like FirstNet MegaRange needed? It’s because it improves connectivity and throughput of data services to cellular towers. In FirstNet’s case, specifically AT&T cellular towers. What this means is increased reliable connectivity, especially in remote regions or areas that are on the edge of typical signal coverage.  

In other words, communication gets better. And better communication means everyone is safer.  

Does My Department Need FirstNet MegaRange?

Better coverage and reliability are certainly a strong plus for FirstNet MegaRange. Before jumping on board, take a moment to determine if this HPUE is truly a good fit for your department.

YES

Many departments benefit from FirstNet MegaRange. These are departments that often find themselves on the outskirts of signal coverage in areas such as:  

  • Remote, rural and tribal regions that are prone to poor connectivity and even blackouts.
  • Maritime scenarios for search and rescue marine operations. 
  • Metropolitan areas or urban canyons where structures are too dense for signals to travel through. 
  • Building shadows or coverage holes such as tunnels, basements, elevators, stairwells and parking garages. 

If your fleet is frequently responding or patrolling in areas such as these, the answer is simple: yes, your department would benefit from FirstNet MegaRange. Improved connectivity results in better communication with dispatchers. This provides safer situational awareness for officers out in the field and quicker backup during tough calls. It offers better treat-in-place medical care and a reduction in the number of hospital visits for ambulance and EMS teams. All this bolsters safety and health for officers, EMS providers and the community. 

NO

We’ll be honest with you. Not every department is a good candidate for FirstNet MegaRange. If your fleet does not typically go to areas on the edge of signal coverage resulting in reduced connectivity, chances are your budget could be better spent elsewhere. FirstNet MegaRange is a major investment and unless you’re going to get good use out of it, you will not get a decent return on investment. It is truly meant for departments who suffer regularly from poor connectivity, coverage and reliability. Bottom line, if connectivity isn’t an issue, you don’t need it.

In Conclusion
FirstNet MegaRange increases connectivity and reliability in remote regions or areas that are on the fringe of typical signal coverage. This heightened communication results in an increase in public safety. While many departments benefit from FirstNet MegaRange, it is not suitable for every fleet. Only those who truly need it should make the investment. 

Find out more about Brite’s connectivity solutions. 

How to Spot Phishing Scams During COVID-19

Two years into the pandemic and phishers are devious as ever. It is no longer enough to consider yourself protected by recognizing traditional phishing email scams. It is essential to stay up to date with current tactics that are being used in COVID-19 phishing scams and the language that hackers use. Failing to do so will leave you vulnerable to having your personal data infiltrated. 

How to Spot COVID-19 Phishing

Here are four COVID-19 phishing ploys that our BriteProtect User Awareness training team is currently seeing across the board. Let’s go through them one by one to find out exactly what makes them “phishy.” 

CDC, Testing & Vaccine Scams

Phishing emails that surround the topic of COVID-19 itself have skyrocketed. Anything related to coronavirus, especially if it contains the words “urgent,” should raise an eyebrow. Be wary of fake COVID tests and testing sites, free tests, kits, and vaccines. Be suspicious of emails from the CDC about confirmed cases, too. If you do receive an email such as these, look at it carefully. Is it from a non-government URL? Is it from a similar domain, but it isn’t quite correct? Do not click on it.  

Take a Look

Example of covid vaccine phishing scam

Red Flags
This one is a bit tricky look at the subject line. If the email is so “urgent” then why isn’t there any important information in the body of the email? The only thing in there is a document to download. Sketchy.  

Travel Scams

Travel scams have taken off and aren’t slowing down anytime soon. Information surrounding vacation policy or itinerary updates, travel cancellations and restrictions are common. Keep your eyes peeled for shady offers for cheap deals or upgrades as well. These emails typically don’t come from a legitimate business source like a travel agency or airline. Rather, they come from janky email addresses. 

Take a Look

Example of covid travel phishing scam

Red Flags
This is a nice-looking email, isn’t it? Not so fast! Look closely at the “from” email address. Does that URL look like a credible business email to you? We didn’t think so either.  

Workplace Scams

All sorts of workplace phishing scams have popped up surrounding COVID-19. Look for language related to reopening, hour changes, work from home policies, mask updates and HR vaccine status requests. Also common are emails from IT, help desks and survey requests. If you get an email like this, make sure you know it’s legitimate before clicking on any links.  

Take a Look

Example of workplace covid phishing scam

Red Flags
Talk about poor grammar. Fragment sentences, incorrect use of commas and wrong capitalization plague this email. Check out the strange link, too – it starts with gcc02 – that is not very credible. Most damning of all, the author threatens to delete the reader from the database if they fail to act. No legitimate IT department would do such a thing.   

Insurance & Bank Scams

Attackers can easily dupe users with insurance and bank scams since these businesses deal with sensitive information on a regular basis. Branch reopening schedules and hour changes are common as well as password change prompts. Be on the lookout for anything that wants you to take immediate action. 

Take a Look

Example of covid insurance phishing scam

Red Flag
For starters, this email refers to COVID-19 insurance. Ask yourself this – did you buy any insurance from the sender? If not, you know it’s phony. Other ways to tell this is a hoax include the interesting spelling of “update,” or should we say “up-date,” along with some missing periods at the end of sentences. Overall, the text just doesn’t read well.  

Be Prepared
Treat your inbox like a warzone – always be on the lookout for the next landmine. Analyze every email before opening and be sure it’s legitimate before clicking any links. It’s tedious to have to constantly watch your every step, yet necessary to keep your data safe.  

Remember, the more prepared you are the better. Many businesses have found success in user awareness training programs which educate employees on the foundations of spam, phishing and spear phishing, malware, ransomware and social engineering. Employees are then able to use their elevated knowledge in their day-to-day jobs.  

In Conclusion
Phishing attacks are constantly evolving and take advantage of any situation – even a global pandemic like COVID-19 – to get what they want. Stay on top of the current language, recognize the red flags and educate yourself so you can spot phishing scams and attacks when – not if – they hit your inbox.  

Learn more about how to protect yourself from phishing scams.

Police UAT

3 Reasons Why Police Need User Awareness Training Programs

The use of body-worn cameras, license plate recognition, mobile computers and other devices in the field have rapidly increased, leading to a direct correlation in an increase of cyberattacks on police departments. Just ask Albany PD and North Miami Beach PD, victims of ransomware attacks and Los Angeles PD, victim of a data breach. With attacks such as these, departments need to take action to protect themselves. A tried-and-true way is to invest in a user awareness training program.  

What is a User Awareness Training Program?

Humans are the targets of cyberattacks, not tools or machines. It is far easier for attackers to trick people than it is to hack through a security system.  A user awareness training program educates employees (or officers) on the foundations of spam, phishing, malware, ransomware and social engineering so they can use this knowledge to become a front line of defense. 

Reasons Police Departments Need User Awareness Training Programs

Police departments and municipalities are highly vulnerable to phishing email scams that allow hackers to gain entry to a department’s system. All members of public safety departments need to be trained to recognize a phishing email scam when it hits their inbox. It is a wise decision for departments to invest in an awareness program that offers protection in three main ways: 

1. Protect the Department from Freezes and Ransoms 

Police departments are vulnerable to having their systems frozen and paying ransoms to cyber criminals because of the critical and therefore valuable nature of their data. This is typically done through ransomware, a sticky situation where malware is used to restrict users’ access until a ransom has been paid to the attacker. This has happened to departments across the country resulting in loss of digital files, video evidence, systems going offline and as much as $5 million paid in ransom money to criminals. 

2. Protect the Public from Personal Data Leaks 

Officers have a duty to protect the public. These days, that also means the public’s data. Successful hackers can easily gain access to the public’s information such as names, birthdates, email addresses, and even social security numbers.  

3. Protect the Officers from Harmful Acts 

Officers themselves are vulnerable to cyberattacks regarding their personal data and information. A major concern for departments is doxxing, or publishing personal information about officers like home addresses and phone numbers, creating a safety hazard for officers and their families.  

What to Look for in a User Awareness Training Program

By now, a User Awareness Training Program should sound pretty good. Training officers to recognize phishing emails results in better protection for the department, public and officers themselves. But what exactly should a user awareness training program entail? 

Be proactive and find a user awareness training program that offers:   

Complex Tactics

Attackers are becoming more sophisticated by the minute, so your user awareness training program needs to use unique and difficult templates to challenge employees during simulated phishing attacks. If things are too easy during training, they won’t be prepared for the real world.  

Consistency

Hackers don’t take breaks and neither should your program. Find a program that is year-round and regularly trains employees. Once a year training is simply not enough! 

Engaging Content 

A good user awareness training program not only educates its users but engages them. Aside from text content, it might provide videos, interactive tools and quizzes. It also must be relevant and customizable to your organization.  

How Brite Can Help

Brite offers a holistic user awareness training program that gives employees and officers the knowledge they need to combat phishing. Our comprehensive process includes five main steps:  

Baseline testing 

We’ll gauge a starting point by testing your employees right off the bat. Then we’ll compare this data with results down the line. 

User training 

We select training content from the world’s largest library of security awareness training to turn your employees into pros. Our content is complex, challenging and engaging. We’ll also craft a program that is unique to your department.  

Employee phishing testing 

We always select company and industry specific templates to realistically simulate phishing, vishing and smishing attacks to test your officers. Think about it – you want a program that is tailored to police departments and not a grocery store, right? 

Results Analysis 

We track the success of your program with detailed reports and analytics. 

Repetition 

We mentioned earlier that consistency is key. Brite sends out four simulated phishing campaigns a year with each campaign consisting of at least ten emails. Remember, training once a year is not enough to keep phishing scams at the forefront of the mind.  

In Conclusion

Officers and police departments are no different from anyone else – they are just as vulnerable to cyberattacks as employees in a traditional business. Departments should invest in user awareness training programs to help protect their critical infrastructures. By doing so, they protect the department, the public, and the officers who serve. Be sure to find a holistic user awareness program that offers year-round, unique training for officers.  

Ready to start your User Awareness Training journey 

user awareness program

6 Keys to Success for a User Awareness Training Program

It’s 22 years into the new millennium and cyberattacks are more prevalent, sophisticated and scarier than ever. It doesn’t matter how much a business invests in technologies and systems to protect its assets against threats if employees are incognizant of phishing emails and ransomware attacks. It’s time for businesses to get with the program. A user awareness training program.  

User awareness programs educate employees on the foundations of spam, phishing, spear phishing, malware, ransomware and social engineering so they can use this knowledge in their day-to-day job.  

Keys to a User Awareness Training Program

Below is a list of six keys that will help launch such a program for those businesses that have wisely considered such an investment. 

1. Gain Organizational Buy-In 
User awareness programs are company-wide and require the participation of every department to be effective. IT handles launch, management and maintenance. Executive leaders are responsible for the overall adaptation of the program. Then, HR is accountable for triggering onboarding and training. Support from these major players is essential for a trickle-down effect of getting the rest of the employees to opt-in and participate in the program. 

2. A Consistent Program 
Phishing emails are sent all day, every day. A once-a-year training course to keep employees on the lookout for attacks is not enough. An effective program that educates employees is both consistent and year-round to be vigilant and knowledgeable when it comes to cybersecurity.  

3. Go Above & Beyond the Minimum Requirements 
Many cybersecurity insurance companies and state regulations require user awareness training programs as a prerequisite for coverage or compliance. Too many companies see training programs as a way to check off a box to complete these mandates. Don’t fall into that slump. Wholesome programs are empowering, are a good investment and can provide years of bolstered defense when done on a consistent basis.  

4. Select the Right Approach 
Companies can choose from three main approaches to user awareness training programs: 

  • Content: A company can create its own content and run the program itself.  
  • Platform: A company leverages an outside organization’s program. Capture pre-created content and use templates.  
  • Managed Service: A company can completely outsource a user awareness training program for another company to manage.  

It is important for a business to analyze its internal resources when determining the right approach. Does it have the time to create its own content? Does it have the necessary technology for platform management? Does it have the funding to hire a managed service?  

A good program educates its users, is relevant to your organization and is customizable. It should instruct with its text and video content but also provide interactive tools such as quizzes. The best programs will truly engage its users rather than just deliver content.   

5. Utilize Complex Tactics 
Attackers are tricky and are using more sophisticated phishing emails every day. They’ll do thorough research to construct messages that are tempting for specific individuals and organizations. Employees are not getting real-world experience if generic templates are used during simulated training attacks. Complex tactics must be used during training so users can reap the most out of the experience and develop a deft eye.  

6. Have Dedicated Resources 
User awareness programs work best when they have a dedicated resource that can focus on its management. Initial setup is not long but implementing it requires more attention and effort. After that comes customizing the program, tracking progress and handling upkeep tasks. Don’t forget, the real key is not one single running but rather consistent, ongoing trainings.  

How Brite Can Help 

Brite offers a comprehensive user awareness training program that truly gives employees the experience they need to fight phishing. Our extensive process includes five steps: 

Baseline Testing 
We’ll gauge the percentage of your users who are at-risk through a simulated phishing, vishing or smishing attack. 

User Training 
Brite selects training content from the world’s largest library of security awareness training. We have access to interactive modules, videos, games, posters and newsletters. We’ll also remind users to complete the trainings. Take a look at some of our free resources here 

Phishing 
We craft carefully selected and company and industry specific templates to create realistic simulated phishing, vishing and smishing attacks to test your users.  

Results 
Detailed reports documenting progress on an organizational, teams and high-risk individual scale are provided monthly for tracking the success of your program.  

Repeat 
Brite will send a total of four simulated campaigns a year with each campaign consisting of at least ten emails. Year-round, consistent training is key to keeping employees trained and at the top of their game. 

Remember 

Humans are the targets of cyberattacks, not security tools or machines. User awareness training programs are essential for those technologies to work properly. Furthermore, if you’re paying for a training program, take the time to truly invest in it by properly educating users. Follow the 6 keys to success above and you’ll be off to a great start.  

As always, if you have any questions feel free to contact a member of the BriteProtect team. 

2022 getac screen size buyers guide

The 2022 Getac Buyer’s Guide: Find Your Perfect Screen Size

2022 brings even more technological advancements making it harder than ever to choose the right mobile data terminal (MDT) for your department. Many departments first start their evaluation by selecting a laptop, tablet or notebook screen size because it plays a critical role in the functionality and portability of the device. Equally as important are durability, weight, battery life and security.  

Check out our review of seven top rugged and semi-rugged Getac screen sizes to determine which is best suited for your department’s needs whether you’re patrolling on a motorcycle, in an upfitted police cruiser or responding on scene in an ambulance. 

Getac Screen Sizes

Let’s take a look from the smallest screen to the largest, each with its own set of perfect applications. 

T800 – 8.1” Fully Rugged Tablet  

Getac T800Quick Take: The T800’s 8.1” screen fits within smaller vehicles, but don’t be fooled. This tablet still comes fully rugged with the full Windows Pro operating system. It includes four touch modes (Touch, Glove or Pen mode plus an optional Digitizer mode).  

Perfect Fit: This Getac screen size is great for motorcycles.

Dimensions 

  • 8.93″ x 5.94″ x 0.94″ (W x D x H) 
  • 1.94 lbs 

Key Features 

  • Optional 4G LTE cellular data 
  • Intel WiFi 6 AX200, 802.11ax 
  • Sunlight-readable display 
  • Class-leading battery life 
  • Designed to fit in one hand 
  • Security features including multi-factor authentication 

Max Configuration 

  • Intel® Atom Processor x7-Z8750 1.6GHz, burst up to 2.56GHz 

UX10 – 10” Fully Rugged 2-in-1 

Getac UX10Quick Take: The versatile and portable UX10 has all the benefits of a lightweight tablet with a fully detachable keyboard. This tablet comes with several accessories like the optional hard handle for easy grip and integrated fingerprint reader. Best of all, it is durable enough to withstand extreme conditions such as hot and cold temperatures and 6-feet drops.  

Perfect Fit: The UX10’s screen size works well with motorcycle patrol and ePCR.

Dimensions 

  • 10.89″ x 7.65″ x 0.92″ (W x D x H) 
  • 2.68lbs 

Key Features  

  • Optional 4G LTE cellular data 
  • Intel® WiFi 6 AX200 WiFi  
  • Digital connectivity through Bluetooth 
  • Stays connected indoors and outdoors 
  • Offers a selection of battery options 
  • Sunlight-readable display 
  • Rain and glove touch screen capability 

Max Configuration  

  • Intel® Core™ i7-10610U vPro Processor 1.8GHz Max. 4.9GHz with Intel® Turbo Boost Technology 
  • Available ports: Audio in/out combo x 1, DC in Jack x 1, USB 3.2 Gen 2 Type-A x 1, HDMI 1.4 x 1, Docking connector x 1 

F110 – 11.6” Fully Rugged Tablet  

Getac F110Quick Take: Slim yet fully rugged, this tablet provides a great stay-in-vehicle solution. It includes an office dock, rotating hand strap with kickstand and a detachable keyboard for comfortable typing. The touchscreen is 26% brighter, readable and easy to use with fingers, gloves or stylus.  

Perfect Fit: The F110 Getac screen size is a match for patrol vehicles and ePCR.

Dimensions 

  • 12.4″ x 8.15″ x 0.98″ (W x D x H) 
  • 3.35lbs 

Key Features 

  • Optional 4G LTE cellular data 
  • Intel® WiFi 6 AX200 
  • Digital connectivity through Bluetooth 
  • Comfortable touchscreen or split-screen experience 
  • Easy to carry 
  • 40 Gbps data sharing with other devices 

Max Configuration  

  • Intel® Core™ i7-1185G7 vPro™ Processor
    Max. 4.8GHz with Intel® Turbo Boost Technology 
  • Available ports: Audio in/out combo x 1, DC in Jack x 1, Thunderbolt™ 4 Type-C x 1, USB 3.2, Gen 2 Type-A x 1, Docking connector x 1 

V110 – 11.6” Fully Rugged Convertible Notebook 

Getac V110Quick take: Thin, light, yet widescreen this notebook offers a top-notch performance. A convertible style keeps the keyboard attached at all times making it easy to use whenever and wherever. Bonus: Commonly mounted in-vehicle as a tablet with detached ergonomic keyboards.  

Perfect Fit: This Getac screen size is a fit for patrol vehicles and ePCR.

Dimensions 

  • 12.32″ x 9.37″ x 1.53″ (W x D x H) 
  • 4.63 lbs 

Key Features 

  • Optional 4G LTE cellular data 
  • Intel® WiFi 6 AX200, 802.11ax 
  • Digital connectivity through Bluetooth 
  • Sunlight-readable display 
  • 4 advanced touch modes (touch, glove or pen mode, plus an optional digitizer mode) 
  • Main chassis is magnesium alloy – strong yet light 
  • Full size, waterproof membrane keyboard 

Max Configuration  

  • Intel® Core™ i7-10610U vPro™ Processor 1.8GHz Max. 4.9GHz with Intel® Turbo Boost Technology 
  • Available ports: Audio in/out combo x 1, DC in Jack x 1, USB 3.2 Gen 2 Type-C x 1, USB 3.2 Gen 2 Type-A x 2, LAN (RJ45) x 1, HDMI 1.4 x 1, Serial port (9-pin; D-sub) x 1, Docking connector x 1 

K120 – 12.5” Fully Rugged Tablet 

Getac K120Quick take: As user preference shifts towards larger screens, the bigger and brighter displays meet those needs. This easy-to-use tablet comes with an attachable full size backlit keyboard. Load, save and transfer data at fast speeds and easily share data with other devices. 

Perfect Fit: The K120 is great inside patrol vehicles.

Dimensions 

Tablet: 

  • 12.97″ x 9.37″ x 0.94″ (W x D x H) 
  • 3.75lbs 

Tablet & Optional Keyboard Dock: 

  • 13.40″ x 12.10″ x 1.85″ (W x D x H) 
  • 6.9lbs 

Key Features  

  • Optional 4G LTE cellular data 
  • Intel® WiFi 6 AX201, 802.11ax 
  • Digital connectivity through Bluetooth 
  • Sunlight-readable display 
  • Touch input by pen, finger, glove or digitizer (optional) 
  • Certified with the IP66 and military-grade MIL-STD 810H standards 
  • Works in temperatures from -29°C to +63°C (-20°F to 145°F)  

Max Configuration Specs 

  • Intel® Core™ i7-1185G7 vPro™ Processor Max. 4.8GHz with Intel® Turbo Boost Technology 
  • Available ports: Audio in/out combo x 1, DC in Jack x 1, USB 3.2 Gen 2 Type-A x 1, Thunderbolt™ 4 x 1, LAN (RJ-45) x 1, HDMI 2.0 x 1, Docking connector x 2 

 B360 – 13” Extreme Rugged Notebook 

Getac B360Quick Take: This notebook is built for those in the field with extreme conditions. A perfect balance of light yet strong, portable yet durable, the B360 will withstand conditions including rain, dust, shock and vibration. It even has an optional salt fog certification. Also, the Getac B360 can be configured with integrated 5G.  

Perfect Fit: The B360 is a match for patrol vehicles.

Dimensions 

  • 13.46” x 11.06” x 1.37” (W x D x H) 
  • 5.11lbs 

Key Features 

  • 5G compatible 
  • Intel® WiFi 6 AX200, 802.11ax 
  • Digital connectivity through Bluetooth 
  • Sunlight-readable display and clear image at night 
  • Touchscreen is responsive to finger, pen or glove 
  • Easily transitions between vehicle and field environments 
  • Multi-factor authentications including an HF RFID reader, smart card reader and face-authentication  

Max Configuration Specs 

  • Intel® Core™ i5-10210U Processor 1.6GHz Max. 4.2GHz with Intel® Turbo Boost Technology 
  • Available ports: PowerShare USB 2.0 x 1, USB 3.2 Gen 2 Type-A x 2, LAN (RJ45) x 1, HDMI 1.4 x 1, Docking connector x 1 

A140 – 14” Fully Rugged Tablet 

Quick Take: The spacious 14” display with wide viewing angles gives you plenty of space to see and work with the added perk of less scrolling. The dual battery design offers the potential for uninterrupted battery life when you’re on the go and there are a handful of carrying and mounting options to choose from.   

Perfect Fit: This Getac screen size fits well in larger patrol vehicles and fire apparatus.

Dimensions 

  • 14.58″ x 9.76″ x 1.279″ (W x D x H) 
  • 5.07lbs 

Key Features 

  • Advanced 4G LTE 
  • Intel® WiFi 6 AX201, 802.11ax 
  • Digital connectivity through Bluetooth 
  • Sunlight-readable display 
  • Multi-factor authentication including Windows Hello and Microsoft Passport 
  • Fingerprint scanner 
  • Front and rear cameras 

Max Configuration Specs 

  • Intel® Core™ i7-10610U vPro Processor 1.8GHz Max. 4.9GHz with Intel® Turbo Boost Technology 
  • Available ports: Audio in/out combo x 1, DC in Jack x 1, USB 2.0 x 1, USB 3.2 Gen 2 Type-A x 1, USB 3.2 Gen 1 Type-C x 1, HDMI 1.4 x 1, LAN(RJ45) x 1, Docking connector x 1 

 In Conclusion

So many variables come into play when selecting an MDT for your fleet. Be sure to include laptop and tablet screen size in your decision as it impacts the functionality and portability of the device – use this Getac guide as a starting point in your quest. From there, get in touch with the team at Brite who is always here to serve you. Our representatives will work with you to identify your needs, explore solutions, provide product demos and so much more.  

Ready to get cruising? 

Contact a Brite Getac Rep today! 

password tips

10 Tips to Make a Strong Password in 2022

Research showed that 23 million account holders used the password “123456” in 2021. We get the appeal – it’s short, easy to remember and it’s one less thing you have to think about in your busy life.  However, this is not a strong password to protect your digital identity. 

Stop and consider it for a minute. Passwords are what keep your information protected and out of nefarious characters’ hands. Is “123456” really what you want between your private data, like bank information, and a hacker?  

Don’t fret – we have good news! Below are ten Dos and Don’ts to help build an arsenal of crafty passwords that will be sure to provide you with the safety, security and protection you need.  

How to Create a Strong Password: 

DO 

  1. Make your password long. 12-14 characters are recommended. 
  2. Use a mix of characters like capitalization, symbols and numbers. 
  3. Use a different password for every account. We mean every.  
  4. Never share your password with anyone. 
  5. Change it every 3 months. 

DON’T 

  1. Don’t use common substitutions (0 for O, or 1 for I, etc.). 
  2. Don’t use real words (e.g. words that can be found in the dictionary). 
  3. Don’t use important numbers like birthdays, anniversaries or your address. 
  4. Don’t use the name of someone or something close to you (kids, spouses, pets etc.). 
  5. Don’t state the obvious. No 12345678, qwerty or password!  

Password Management 

Did we say a different, strong password is needed for every account? Yes! The reason is simple: once a hacker has access to one account, he or she will have access to others if the password is the same. 

How are you supposed to remember all those different passwords, especially if you can’t use your dog’s name or your birthday? One potential solution is to use a password management tool. This will store your credentials in one secure location using encryption. You no longer have to memorize logins or passwords and you can say goodbye sticky notes all over your desk.  

Before making your choice, do thorough research on password managers so you’re familiar with the security features and the reputations of each. Some password managers offer free trials with the option of eventually upgrading to a paid plan.  

In Conclusion 

Passwords are tricky little devils to write, but that is exactly what they need to be – tricky. Take the time to create numerous good, unique, strong passwords that are sure to stump devious intruders. If you’re worried about forgetting all the complex passwords you’ve created, try out a password management tool.  

After all, it’s your data. Do your part to protect it.  

Learn more about user awareness materials Brite has to help educate the last line of defense. 

Signs of phishing email scam

7 Signs of a Phishing Email Scam

It is difficult for readers to decipher attacks from legitimate emails because phishing email scams are maliciously designed to be manipulative and deceitful. They are so effective that data from 2021 showed 30% of phishing emails were opened by targeted users and 12% of those users clicked on the malicious attachment or link. Those statistics are quite frankly not very optimistic.  

Keep reading to discover a handful of tips to identify phishing email scams as they hit your inbox and avoid becoming a statistic for 2022’s data.   

Think Inside the (In)box 

Most inboxes are hit with tens to hundreds of new emails each day. You must be attentive each time you open your inbox and check your unread messages. A successful phishing email scam has the victim complete an action, such as click a link, enter login credentials, wire money, etc. You may fall prey to one of these prompts if you are not focused on the task at hand and vigilant of potential threats. 

The risk of being scammed increases the more distractions there are. Reduce distractions so you can sift through your inbox strategically – turn off the television, set down the sandwich and put the car in park.  

Signs of Phishing Email Scams 

Here’s the checklist of criteria our team of cybersecurity professionals put together to determine if an email is suspicious:  

1. Inconsistent URLs, links and email addresses 

Check for small changes in common domains to see if link URLs are consistent with the sender domain. An easy way to do this is to hover over the link inside the email message. Be wary if the URL doesn’t belong to the company that supposedly sent the message.  

2. Incorrect spelling and grammar 

The reason poor spelling and grammar are used in phishing email scams is twofold. First, some scams originate overseas where English is not the actor’s first language. Second, devious actors strategically use subpar spelling and grammar to weed out critical people leaving those who fall prey to phishing more likely to complete the desired action.  

3. Threats or demands for action 

No credible organization threatens its customers with serious consequences. Consider it suspicious if an email sender demands that you click a link, open an attachment, or reply with personal information (i.e. financial information) or else face legal action or a frozen account.  

4. Request from a vendor to an unassociated email address 

Know which email addresses are associated with each account you have if you have multiple ones. Be skeptical of requests to non-associated addresses. For example, assume phishing if you receive an email from Amazon to your professional email and the account is not linked to it.   

5. Unexpected email or attachments 

Use caution if you’re not expecting to hear from someone via email. The same goes for unexpected attachments. Don’t click on it. Give the sender a call to see if they truly emailed you an attachment.  

6. Low-resolution logo 

Phishers often use crude tactics like “cut and paste” to grab a logo from an organization’s website to pass it off as their own. Chances are the sender doesn’t work there if a government agency, bank or other legitimate organization’s logo is low quality, blurry or just not prominent.   

7. Offers for free stuff or cheap deals 

Offers that sound too good to be true probably are too good to be true. Things like free products and services, cheap bargains, sweepstakes and prizes should raise an eyebrow and an alarm.  

Remember 

DO 

  • Be vigilant when checking emails. Always give full attention to the task at hand and never give any suspicious sender the benefit of the doubt. 
  • Look at the “from” address. An email is fraudulent if it says it’s from a legitimate organization (e.g. a bank or financial institution) but comes from something like a Gmail account.  
  • Make sure your endpoint protection and patches are current. 

DON’T 

  • Don’t give out personal information or financial data. 
  • Don’t click on a link, open an attachment or call phone numbers provided in unexpected emails.  
  • Don’t use the same password for every account. Using varied passwords for each account will protect you if you do get hacked. The hacker will have trouble accessing the other accounts even if one account is phished. Also, change passwords right away if you think you have been breached. 

 

Be prepared – phishing email scam tactics are always evolving. Stay up-to-date and learn as much as you can about the latest methods that attackers are using. You will be able to better identify advanced techniques the more educated you are and the more exposure you have.  

Businesses may also consider implementing anti-phishing and user awareness training programs to educate all of their employees. Contact us with any questions about phishing or to start your user awareness training program today!  

Scroll to Top