Rogue Stork Racks Up Huge Cell Phone Bill, Redefines Cloud Migration?

July 16, 2018Manhattan Tech Support

Cloud ServicesIT Consulting & StrategySecurity

A lot of our office help, tech services, and IT support have a certain amount of crossover with mobile devices. This is a story that teaches us to keep data secure during cloud migration (and literal migration), lest you pay a hefty price.

In Poland, there’s a stork named Kajtek. In 2017, an environmental conservation group called EkoLogiczna wished to study the migratory patterns of Kajtek, so they suited him up with a GPS tracker. Kajtek was known to travel to Africa for the winter and the group was able to monitor and gather data from more than 6,000 kilometers traveled by the stork. Something changed this past February when Kajtek diverted from his usual course back to Poland and made a two-month pit stop in Sudan. Here he would dally for two months, never really traveling farther than distances of 25 kilometers. Then, in April, his signal was lost and he went dark.

Kajtek’s tracking device used SIM technology. Later, in June, EcoLogiczna received a phone bill linked to the SIM card in Kajtek’s tracker for $2,663. Without much digging, the reason for the outrageous bill was determined quickly: “Someone quite simply removed the card from the tracker, put it in a phone and used it for 20 hours of communication,” the environmental group posted on its Facebook. Perhaps more tragic than the bill is that no one knows what happened to Kajtek. We can only hope that he’s flying through the African skies, finally free of his GPS burden.

Perhaps the two-fold lesson is that cloud migration strategies ought to be bolstered with tight security. Cloud-based platforms like Office 365 can be installed on up to 15 devices per user, which leaves a potential security threat in multiple places. The convenience of cloud technology often leaves room for careless error. Take Kajtek’s example with something as simple as SIM technology and a stork racking up a $2,600 phone bill. Scale that up to massive data breaches in cloud storage and the repercussions are much more devastating.

Related Articles

4 Ways Your Business Can Prepare for the Next Phishing Attack

calendar May 13, 2019

author Manhattan Tech Support

Cloud Services IT Consulting & Strategy Security Tech Support & Managed IT Services Construction Education Finance Healthcare Legal Real Estate

4 Ways Your Business Can Prepare for the Next Phishing Attack

Phishing is a type of cyberattack in which criminals disguise themselves as reputable businesses or trusted individuals to obtain valuable information, like your network credentials, passwords, or financial information. As of 2019, phishing is one of the most popular types

Read More
How to Choose the Best IT Help Desk Provider

calendar May 8, 2019

author Manhattan Tech Support

IT Consulting & Strategy Tech Support & Managed IT Services Construction Education Finance Healthcare Legal Real Estate

How to Choose the Best IT Help Desk Provider

Research shows that businesses lose about two weeks of productivity per employee per year because of day-to-day technical problems. Even companies that have internal IT staff may struggle to keep their computers running smoothly. An over-burdened IT team that’s forced

Read More
ManhattanTechSupport.com LLC Named to ChannelE2E Top 100 Vertical Market MSPs: 2019 Edition

calendar May 7, 2019

author Manhattan Tech Support

Business Intelligence Cloud Services IT Consulting & Strategy Security Software Development Tech Support & Managed IT Services Telecommunications Construction Education Finance Healthcare Legal Real Estate

ManhattanTechSupport.com LLC Named to ChannelE2E Top 100 Vertical Market MSPs: 2019 Edition

ManhattanTechSupport.com LLC has been named to After Nines Inc.’s ChannelE2E Top 100 Vertical Market MSPs list and research (http://www.channelE2E.com/top100) for 2019. The annual list and research (hashtag: #Top100MSP) identify and honor the top 100 managed services providers (MSPs) in healthcare,

Read More