ManhattanTechSupport.com Rebrands as Homefield IT; Providing Strategic Technology Services Across the Country.

Learn More

Rogue Stork Racks Up Huge Cell Phone Bill, Redefines Cloud Migration?

July 16, 2018Homefield IT

Cloud ServicesIT Consulting & StrategySecurity

A lot of our office help, tech services, and IT support have a certain amount of crossover with mobile devices. This is a story that teaches us to keep data secure during cloud migration (and literal migration), lest you pay a hefty price.

In Poland, there’s a stork named Kajtek. In 2017, an environmental conservation group called EkoLogiczna wished to study the migratory patterns of Kajtek, so they suited him up with a GPS tracker. Kajtek was known to travel to Africa for the winter and the group was able to monitor and gather data from more than 6,000 kilometers traveled by the stork. Something changed this past February when Kajtek diverted from his usual course back to Poland and made a two-month pit stop in Sudan. Here he would dally for two months, never really traveling farther than distances of 25 kilometers. Then, in April, his signal was lost and he went dark.

Kajtek’s tracking device used SIM technology. Later, in June, EcoLogiczna received a phone bill linked to the SIM card in Kajtek’s tracker for $2,663. Without much digging, the reason for the outrageous bill was determined quickly: “Someone quite simply removed the card from the tracker, put it in a phone and used it for 20 hours of communication,” the environmental group posted on its Facebook. Perhaps more tragic than the bill is that no one knows what happened to Kajtek. We can only hope that he’s flying through the African skies, finally free of his GPS burden.

Perhaps the two-fold lesson is that cloud migration strategies ought to be bolstered with tight security. Cloud-based platforms like Office 365 can be installed on up to 15 devices per user, which leaves a potential security threat in multiple places. The convenience of cloud technology often leaves room for careless error. Take Kajtek’s example with something as simple as SIM technology and a stork racking up a $2,600 phone bill. Scale that up to massive data breaches in cloud storage and the repercussions are much more devastating.

Related Articles

AI trends in IT management

calendar March 22, 2023

author Homefield IT

Artificial Intelligence Business Intelligence Cloud Services Cyber Insurance IT Consulting & Strategy Tech Support & Managed IT Services Construction Education Finance Healthcare Legal Non-Profits Real Estate Startups

AI trends in IT management

AI is on everyone’s minds these days. ChatGPT3 and OpenAi have brought what’s possible to the mainstream in a way we haven’t seen outside of movies before. If you’ve spent any time following the trends online, there’s a lot of praise for what’s possible, what could be possible, and what will be possible over the […]

Read More
Best Microsoft 365 features for 2023

calendar March 15, 2023

author Homefield IT

Business Intelligence Cloud Services IT Consulting & Strategy Software Development Tech Support & Managed IT Services Construction Education Finance Healthcare Legal Non-Profits Real Estate Startups

Best Microsoft 365 features for 2023

Microsoft’s office suite (now called Microsoft 365) has come a long way from its early days as a word processor and spreadsheet platform. These days, Microsoft 365 is a powerhouse of productivity tools that handle everything from word processing to email and everything in between. With all the products and features that come bundled into […]

Read More
Digital Trust – what is it and how does it affect your business

calendar March 8, 2023

author Homefield IT

Business Intelligence Cloud Services Cyber Insurance IT Consulting & Strategy Security Tech Support & Managed IT Services Telecommunications Construction Education Finance Healthcare Legal Non-Profits Real Estate Startups

Digital Trust – what is it and how does it affect your business

It seems we hear new stories about cybercrime every day. The stories range from huge ransomware attacks on hospitals to city infrastructure being compromised. It might seem like this isn’t something that you and your business need to worry about, but it matters more each day. Customers need to know that your business (and by […]

Read More