Technology Advisor Blog



Keyboard Shortcuts - A Few of My Favorite Things

Posted by Ann Westerheim on 1/18/21 4:43 PM

The New Year is a great time to get organized!  Learn how to use some simple keyboard shortcuts to boost your productivity.  Keyboard "shortcuts" are a combination of keys that give quick access to a particular computer function.  Shortcuts rely on the special keys:  Ctrl, Alt, Shift, Tab, Windows Logo Key (the key with the Microsoft four squares on the lower left of the computer).   

Read More

Tags: productivity, windows 10





Cybersecurity Trends for 2021

Posted by Ann Westerheim on 1/11/21 5:18 PM

Bell bottoms, neon colors, Rubik's Cube, pet rocks, kale…  Trends come and go, and generally, we’re not one to care much about what’s in style, but cybersecurity trends? That’s one we can get behind and think that there can never be enough of!

So, what can you expect to see as both a consumer, employee, employer, business owner or just a member of the general public who has a computer? Let’s take a look at what we are seeing.

Home is where the heart is.
And it is where the school is, and the office, and unfortunately it is where the likelihood of an attack or breach happens as well. That means that you need to ready your home and prepare to not only protect but also respond in the event of your network or smart devices being compromised. Ensure that as a worker or student, you are well protected and working with your IT support staff to have all security measures in place. It won’t be easy since many of us are playing catch up to the unexpected transition from last year to work from home scenarios, but it will be of the utmost importance as we move forward with this being the structure for the foreseeable future.  Don't get overwhelmed as there are many smart and affordable options for security.

Inside Job
There is a horrible phenomenon that is growing in popularity known as insider-threat-as-a-service. Yes, you can buy a disgruntled employee to sabotage a business and compromise data integrity by stealing information or breaking the business from inside. While this has been around for longer than 2021, with the hiring process for remote employees being done via video or other long-distance methods, it isn’t always easy to gather and gain the trust you might have had from years of sharing office space.  A solid onboarding AND offboarding process are important parts of any business plan.

Fake ID
Stolen credentials can be used for more than obtaining a credit card. Yes, you can build up an identity and establish credit, but you can take it a step further and build up a history that doesn’t exist in reality to the person it is being created for. This is a step up from the insider job that can happen, but you do need to be aware of who you are hiring and providing your confidential information to.  "Deep fakes" are a big trend, and we can't always believe what we see. 

Bigger Phish
With humans being the biggest risk to cybersecurity and working from home being the norm, you can expect a rise in attacks. Why? Because humans are the easiest point of entry for any hacker, and unmonitored humans are even easier to trick. So phishing scams will be even more popular when it comes to attack attempts. No one thinks they'll be the one to click on the wrong email, but people do.  These types of emails are designed specifically to trick people into opening them.  You can mitigate your risks by using a training platform to make sure everyone on the team is up to date with the latest threats.

The bottom line with any trend is that it will increase and decrease in popularity over time, but the one trend that isn’t going anywhere is the threat of data breaches.  There's no such thing as 100% security, but some basic and affordable solutions will help your organization drastically improve your protection. 

Read More

Tags: small business, cybersecurity





Do I need a password manager?

Posted by Ann Westerheim on 1/4/21 5:22 PM

Do I need a password manager?  The quick answer is YES!  

Read More

Tags: password, cybersecurity





Why Does My Office Computer Cost More Than My Home Computer?

Posted by Ann Westerheim on 12/28/20 3:31 PM

This is the time of year when many businesses decide to upgrade hardware to expense for the end of the tax year.  Every December we see a surge of urgency around getting things done at the end of the year.  If your computers are five years old or more, its time to replace! 

Read More

Tags: small business, computer





Google Top Searches 2020 - The Year of "Why?"

Posted by Ann Westerheim on 12/21/20 4:40 PM

Google published its annual report of top searches, revealing the most popular search terms across many categories.  2020 was a year like no other, and its always fascinating to see the compiled results.

Read More

Tags: data, google





Help! The Cloud can Disappear?

Posted by Ann Westerheim on 12/14/20 7:31 PM

When Google experienced a major outage this morning, we all got a reminder that our "always on" world isn't always on.  Google Docs, gMail, Google Classroom and YouTube were all down early this morning.  The problems were mostly resolved within around an hour, but some users experienced longer outages.

Read More




Don't Click on that Message from the IRS

Posted by Ann Westerheim on 12/7/20 9:43 AM

Hackers thrive on uncertainty, and with COVID-19 cases climbing, a long election cycle, and the holidays approaching, there's a lot of stress and chaos in our lives. This is an important time to remember that hackers take advantage of this uncertainty and it's more important than ever to stay vigilant on line.

Small businesses have been particularly hard hit by the pandemic, and with the financial crisis, any stimulus funds from the government are greatly needed, but don't click too fast! Phishing scams and business email compromise (BEC) scams are an ongoing part of cybersecurity awareness training, but it's important to be aware that hackers have more choices including text messages.

We see this in a recent warning from the Internal Revenue Service to not click on any text messages that you receive which claim to have economic stimulus check information in them. In the scam, victims are instructed to provide banking information for the $1200 check to be deposited into. This trick is just another way that online crime is being committed against unsuspecting consumers – the same consumers who are likely vulnerable and looking for assistance during the pandemic.

The IRS will never ask you for your banking information via a text or phone call and will not send unsolicited texts and emails that are asking you for personal information. If you receive any of the above, get the contact information for the caller, or close the website and go to the official IRS website to call in and inquire about the request or demand. Remember, hackers can disguise links to look legitimate, but most – if not all, government websites should end in the .gov extension – but that does not always ensure it is safe! This is just a factor that can help to determine legitimacy. Also, just because a website address includes the "s" with "https" and has a "lock" icon, it doesn't mean the site is safe.

Even if you keep your security up to date with security patches, antivirus updates, firewall, and more,  these types of attacks are designed to basically get you to effectively open the front door. Years ago, fake websites looked fake - it was easy to spot them. Today, fake website are very convincing - great graphics and text, and you may not be to tell you're at a bad site.

This current scam takes you to a site that appears legitimate, and you may be inclined to enter banking information – don't do it. The verbiage will alert you that you’ve already received the stimulus check, you just need to accept it – sounds easy, but don't do it. Do not click on the link. The Get My Payment site that you are likely being redirected to is not legitimate, even if it looks like the real one.

If you receive this text, screenshot it and email it to phishing@irs.gov along with the date that you got the text, the phone number from which it came from, and your own number. Reporting these scams helps organizations increase awareness so others are less likely to be hacked.

At Ekaru, we strongly recommend ongoing security awareness training to keep your business and your employees safe. A strong foundation of security protection is critical, but for threats that are designed to sneak through and trick users, the human factor is so important. If you know how the scam works, you'll be one step ahead of the hackers.

Read More

Tags: cybersecurity





November 30th is "Computer Security Day"

Posted by Ann Westerheim on 11/30/20 11:38 AM

October was National Cybersecurity Awareness month, and today, November 30th is "Computer Security Day".  Security awareness is a big part of keeping your business safe - keep security top of mind for you, your employees, and your family today and everyday

Read More

Tags: Microsoft Security Patches, cybersecurity





Think Big.  Shop Small.  31 Million and Counting...

Posted by Ann Westerheim on 11/23/20 3:31 PM

2020 has been a challenging year for all, especially small businesses.  Did you know that there are over 31 million small businesses in the United States?  At Ekaru, our mission from the start has been to provide enterprise class IT services to small business.  During the past several months, working closely with our small business community has reinforced how much small business means to all of us.

Read More

Tags: small business, small business technology





October was Cybersecurity Awareness Month, but Don't Stop!

Posted by Ann Westerheim on 11/12/20 10:43 AM

Each year the National Cyber Security Alliance promotes Cybersecurity Awareness Month during the Month of October.  It's estimated that over 90% of breaches occur as the result of user error, so developing a culture of cybersecurity in your organization is more important than ever.  Each day in October we posted a Myth or a Tip on our social media, and as much as a month of increased awareness helps, Cybersecurity is really an ongoing effort.

Read More

Tags: Compliance, cybersecurity, ransomware, security awareness training





Subscribe by Email





    Most Popular Posts



    Browse by Tag

    See all tags...


    Posts by Month



    Connect With Us



    Older Blog Posts

    For older Ekaru blog posts, go to ekaru.blogspot.com.