Home
About Us
Products & Services
Helpdesk and IT Support
Cybersecurity
Data Protection
Email & Collaboration
Voice
Strategy & Planning
News & Events
Tech Tips
Contact Us
Technology Advisor Blog
Why I Changed My Out of Office Auto-Reply - And Why You Should Too
What Is a Pen Test - and Why Small Businesses Can't Ignore It
Cybersecurity Tips to Keep Your Devices Safe While Traveling This Summer
Scam Detected-DMV Smishing Text
Cybersecurity Basics: What Is Multi-Factor Authentication and Why Does It Matter?
How to Spot a Phishing Email: A Quick Guide for Small Business Teams
Local Targets: Spoofing Scams Are Closer Than You Think
Daily AI, Daily Dangers? A Wake-Up Call for Smart Use
Reducing Email and Contact Form Spam For Your Business
Cyber Insurance: What Small Businesses Don't Know Can Hurt Them
How AI is Making Phishing Attacks Smarter - What Small Businesses Must Do Now
How Supply Chain Cybersecurity Risks Can Affect Your Business
Click Happens - Human Error Remains The #1 Cyber Risk
April 2025: A Wake - Up Call for Healthcare Cybersecurity
DMARC Gets Serious: Microsoft Enforces Stricter Email Rules
Spring Cleaning for your Cybersecurity: 10 Things You're Probably Overlooking
Cybercrime Soaring in the 2020s - Businesses and People at Risk
Cybersecurity Starts Here: Identify What Matters Most
Keeping Up With All Things Microsoft - April 2025
15 Window Shortcuts to Boost Your Daily Productivity
Credit Card Fraud Is a Headache and Business Cybercrime Is a Full-Blown Crisis
If You've Never Thought of Cybersecurity, You're Exactly Who The Cyber Criminals Want
Understanding Quit Claim Deed Fraud: FBI Boston Steps In as Scams Escalate
Why Delaying a Written Information Security Plan (WISP) Could Be Your Business's Costliest Mistake
The Cybercriminals' Playground: Navigating the Dangers of Tax Season
Regret to Resilience: What Small Businesses Learn After a Cyber Incident
No More Online Sales: Joann Fabrics Warns Customers of Website Scams
Five Smart IT Cost Management Ideas for Growing Businesses
Beware of the Rising EZPass Smishing Scams
How Cybersecurity Changes Impact Small Businesses
Ekaru Recognized on CRN's Pioneer 250 List
Sweetheart Scams & Cyber Threats: Don’t Let Hackers Steal Your Heart… or Your Money
PCI Compliance & Beyond: What DMARC Means for Your Business
It's COLD Outside And Your Electronics Don't Like It!
Truth in Tech: What Local Businesses Need to Know About the FTC’s Crackdown on Fake Reviews
The One Easy Change That Reduces 99.9% of Your Microsoft 365 Security Risk
Microsoft 365 and Multi-Factor Authentication: A Simple Step to Secure Your Small Business
Five Small Business Cybersecurity Threats You Can't Ignore
Small Business, Big Threats: Why Cybersecurity Awareness Month Matters to You
When Cybersecurity Feels Annoying: The Role of Web Filtering and DNS Protection
When Security Updates Cause a Tech Meltdown: Why Your Business Still Needs Robust Cybersecurity
Protect Your Business: How to Spot and Prevent Domain Spoofing Scams
Business Continuity Planning for Boston Area Companies
Boston Data Security Services: Why Data Protection Matters
Ransomware Protection in Boston: 5 Things You Must Do
Virtual CIO Services: Hiring a Competent Boston Area VCIO
Cybersecurity Training for Board of Directors: A Full Guide
Simple Cybersecurity: Budget-Friendly Vulnerability Scans for SMBs
The CIO Effect: Transforming Small Business with Big Tech Strategies
Outsmarting QR Code Scams: Your Guide to Spotting and Stopping Them
Ekaru Awarded ScalePad Partner Advisory Council Partner of the Year
Managed IT Services in Boston and Surrounding Areas
How Much Will Cyber Crime Cost in 2024?
Shield Your Success: The Essential Guide to Cybersecurity Insurance for Small Businesses
2024 State of Cybersecurity: Convenience, Security, and Digital Transformation
I Don't Want a Teams Meeting Link in my Calendar Invitation
Back-to-School Cybersecurity Tips
ChatGPT Doesn't Keep Secrets - Create a ChatGPT Acceptable Use Policy to Protect Your Business
Did you know? You can get call center technology on a small business budget
Ekaru Announces Commitment to Growing Global Cybersecurity Success by Becoming a Cybersecurity Awareness Month 2022 Champion
I'm a Small Business. Why Would a Ransomware Gang be Out to Get Me?
Did you Know? Voicemail Tips and Tricks
IT Industry Outlook 2022 - Getting back to Strategic Initiatives?
Do Passwords Pose a Security Risk for your Business?
Changes Ahead! Microsoft New Commerce Experience [NCE]
Top 12 Reasons to Clean Your Network Closet
Is Your Phone System Ready for 2022?
Top 4 Tech Trends for 2022
Get Your Technology In Shape: An Easy Way to Prioritize IT Gaps
Technology New Year's Resolution: Prioritize Your Technology Gaps
How to Get Started with an Incident Response Plan
Cyber Secure? Beware of Black Friday Scams!
Combatting Business eMail Compromise Risks
Cybersecurity: Changes ahead for CMMC will help SMBs
Why is October Cybersecurity Awareness Month?
Ekaru Announces Commitment to Global Efforts Advocating for Cybersecurity and Online Behavior Change during Cybersecurity Awareness Month
Save Time with Computer Keyboard Shortcuts
Cybersecurity: 4 Ways Your Employees Could Be Putting You at Risk
Back to School: How to Get Started with an Employee Cybersecurity Training Program
Cybersecurity Tip: Don't click on that link OR dial that number
Stepping up your Cybersecurity with "Defense in Depth"
Bringing more than just your laptop back to the office.
Sharing Too Much on Social Media? Watch out for Hackers.
Work from Anywhere? Add extra screens to your laptop!
Old Electronics? Don't Throw Them in the Trash!
Cryptocurrency 101
Did you know? How to use your iPad as a second display for your Mac
Tax Time and Cyber Scams
ParkMobile Data Breach Exposes Information on 21 Million Users
Just Published: The FBI 2020 Internet Crime Report
Cybersecurity in 2021 - Security Awareness Training
Keep Your Technology Fresh and Stay Secure
Work From Home - An Employee Checklist
The Florida Water System Hack and What it Means for Local Towns in Massachusetts
CMMC - Cybersecurity Maturity Model Certification - 101
Cyber Burnout Getting you Down?
Building a Cybersecurity Culture with Training
Keyboard Shortcuts - A Few of My Favorite Things
Cybersecurity Trends for 2021
Do I need a password manager?
Why Does My Office Computer Cost More Than My Home Computer?
Google Top Searches 2020 - The Year of "Why?"
Help! The Cloud can Disappear?
Don't Click on that Message from the IRS
November 30th is "Computer Security Day"
Think Big. Shop Small. 31 Million and Counting...
October was Cybersecurity Awareness Month, but Don't Stop!
Cyber Tip: Know what breaches include your data before a phishing email hits your inbox
Ransomware - Don't Pay the Ransom!
Ekaru Announces Commitment to Global Efforts Supporting and Promoting Online Safety and Privacy for Cybersecurity Awareness Month
Going Remote - Phones and Office Collaboration Technology Made Simple
The Psychology of Passwords - Are your Passwords Secure?
Reopening the Workplace After COVID-19: A Checklist for Businesses
Leading a Team Through Crisis and Pivoting Your Plan for Success in 2020
Cybersecurity During the Pandemic and Stay at Home Orders Impact on Small Business.
Get a Custom Zoom Background in 3 Easy Steps
Beware! COVID-19 Safety emails Deliver Malware Instead
Work From Home - Stay Safe On-line with Strong and Unique Passwords
Is Work From Home Causing You Back Pain?
10 Tips to Keep Cybercriminals Out While Corononavirus Keeps You In
Videoconferencing from Home - What you need to know
Supporting Local Small Businesses During COVID-19
VoIP Telephony - e911 and Staying Connected in the Covid-19 Crisis
How to Get the IT Management Services You Need During the COVID Outbreak
3 Tips for Working Remotely to Help Your Team Stay Productive
Keep Your Company Running Smoothly with Ekaru’s Enterprise IT Services
COVID-19 - Remote Work Tips
Technology Tips and Advice for Remote Workers
Technology Help for Remote Office Workers
Big Patch Tuesday from Microsoft - 99 Security Patches
Retiring an Old Computer? Don't Forget to Get Rid of your Data!
Cybersecurity - Conversations with SMBs...
October is National Cybersecurity Awareness Month - Resources for SMBs
Key Takeaways: Verizon Data Breach Investigations Report
2019 State of Cybersecurity - Lunch and Learn Presentation
Professional Tax Preparers: Do you have a Written Data Security Plan?
Employee Buy-In for Security Awareness Training - It Matters!
Cybersecurity - Explained in Plain English
Are You Still Using Windows 7? It's Time for a Change!
Cybersecurity Awareness Training - Everyone Needs to Get Involved!
How to Take Screenshots in Windows 10, with a Twist
Are you ready? Microsoft will stop supporting Windows 7 (and Server 2008) in January 2020.
13 Ransomware Statistics All Businesses Must Know
Don't Click on that eMail Security Warning Message!
A hacker has your password. Now what?
Want to achieve your goals in 2019? Get organized and take action!
Cyber Attacks Increasing - Cape Cod Community College Hacked for $800,000
The End is Near! Windows 7 End of Support January 2020
Watch Out for Holiday Gift Card eMail Scams
A Creepy eMail in Your Inbox - Someone Knows Your Password
How the Dark Web Impacts Small Businesses
A New Twist on the Microsoft Support Scam
Got Ransomware? What's your Disaster Recovery Plan?
Ransomware: Don't be a victim!
You've Got Ransomware... Now What?
5 Surprising Tech Trends Boosting Small Business Growth
What I learned at Hubspot Inbound 2018
Are your passwords really keeping you safe?
Wait a minute! The minute by minute cost of Cybercrime
Cybersecurity is Everyone's Job - Recommended Summer Reading.
A Creepy Twist on Ransomware - Using your hacked passwords
Another Scam to Watch Out For: "Neighbor Spoofing"
Whats New in SMB Tech? Internet (VoIP) Phones!
Important Notice Regarding Your Domain Name(s)
Got a consumer class router? Power cycle it NOW!
Cybersecurity - What is the cost to Small Businesses? Another factor to think about related to Microsoft Security Patches...
Ekaru Now Delivers Dark Web Monitoring Services through ID Agent Partnership
Cybersecurity - Why you need to train your employees
Cybersecurity is a LOCAL issue - Massachusetts school district pays $10,000 ransom to unlock its files after cyber attack.
Sending an email to more than just a few recipients? DON'T hit the send key before reading this....
Help! Sent Items Folder in Outlook Only Shows My Name
Facebook Privacy - Big Brother is watching you and has been for a long time!
Phishing: Would your employees click on any of these emails?
Texting, eMail, and HIPAA
Technology, Patience, and Wireless Displays... Lesson Learned.
What's the difference between Internet providers?
10 Ransomware Statistics ALL Businesses MUST Know
Don't Let Cyber Crime ruin your holiday!
Internet Outages Across the Country Yesterday - What Happened?
Tech Tip: How to easily document computer steps
WPA2 Wireless Security Vulnerability - What You Need to Know
You need to know this before you sell or donate your old computer
Train Your Workforce so They Don't Get Caught by a Phish!
Beware of Phishing attempt to "Authenticate your Account"
eMail Delays in the "Always On" World
Ekaru Gives Back: Donates Socks to Boston Healthcare for the Homeless
Help! My Spam Filter is Blocking GOOD mail
Google AutoDraw turns your scribbles into beautiful icons for free
Employee Training - Protect Your Company From Ransomware
WannaCry Ransomware - 4 things you need to know
Couple Lost Home over email Scam - What you need to know.
No Patch Tuesday this Month!
Thinking about a New Phone System in 2017?
How can I send a Text Message from a Computer?
What's my email password?
Don’t just rely on good luck to protect your data! ….you won’t after reading this….
Security Alert: Don't forget to Reboot your Computer!
Ekaru Donates a Digital Sign to the Cameron Senior Center
Protect your Computers with Proper Power Management
Don't post pictures of your boarding pass on the Internet
Prev
1
2
Next
Subscribe by Email
Search
Browse by Tag
cybersecurity
(115)
small business
(40)
cybersecurity training
(28)
eMail
(22)
small business technology
(17)
ransomware
(16)
Cybersecurity, email scams
(15)
cybersecurity, ransomware
(15)
small business technology advice.
(14)
data security
(12)
Security
(11)
computer security
(11)
phishing
(11)
remote work
(11)
work from home
(9)
spam
(8)
SMB
(7)
VoiP,
(7)
email security
(7)
Managed Services
(6)
password
(6)
Cyber Insurance
(5)
Encryption
(5)
Internet Explorer
(5)
Microsoft Office
(5)
Microsoft Outlook
(5)
backup
(5)
Artificial Intelligence
(4)
Internet
(4)
Monitoring
(4)
Privacy
(4)
business continuity
(4)
computer
(4)
data backup
(4)
incident response
(4)
laptop
(4)
security protection
(4)
training
(4)
Compliance
(3)
MA Data Security Law
(3)
Microsoft
(3)
Microsoft Outlook 2010
(3)
Microsoft Security Patches
(3)
Outlook
(3)
Outlook 2010
(3)
Security Requirements
(3)
Virus
(3)
Windows 7
(3)
cryptolocker
(3)
disaster recovery
(3)
online safety
(3)
paperless
(3)
productivity
(3)
security awareness training
(3)
spam filtering
(3)
spoofing
(3)
201 CMR 17.00
(2)
ChatGPT
(2)
Cleaning your computer
(2)
Computer Tip
(2)
DNS
(2)
Dark Web
(2)
Desktop
(2)
General
(2)
HIPAA
(2)
Internet Outage
(2)
Internet usage
(2)
Keyboard Shortcuts
(2)
Microsoft 365
(2)
Microsoft Office 2010
(2)
Microsoft Updates
(2)
Microsoft Windows 7
(2)
Microsoft Word 2010
(2)
PDF
(2)
Phone System
(2)
SPF record
(2)
Security Awareness
(2)
SecurityBreach
(2)
Slow Computer
(2)
Time Management
(2)
Voicemail
(2)
Wireless Network
(2)
breach,
(2)
cloud
(2)
computer support
(2)
customer survey
(2)
data
(2)
domain name
(2)
e-Mail
(2)
hard drive
(2)
managed IT services in Boston
(2)
operating and storage temperatures for electronics
(2)
passwords
(2)
performance
(2)
postini
(2)
printer
(2)
ransomware recovery
(2)
security risk assessment
(2)
service
(2)
strong passwords
(2)
web site
(2)
.nk2
(1)
123456
(1)
2003
(1)
2007
(1)
3.14
(1)
ALT+H
(1)
AVERAGE
(1)
Adobe
(1)
Adobe Flash
(1)
Adobe Reader
(1)
Attach Item
(1)
Awards
(1)
BHCHP
(1)
Bcc
(1)
Beginner
(1)
Boston Ransomware
(1)
Brother MFC-495
(1)
CMMC
(1)
Calendar
(1)
Caller ID Scam
(1)
Client survey
(1)
Closing Tabs
(1)
Cloud computing
(1)
Comcast
(1)
Compress
(1)
Computer cables
(1)
CrowdStrike
(1)
Customer service
(1)
Cybersecurity training for a board of directors
(1)
Cybersecurity, Smishing
(1)
Cybersecurity, Travel
(1)
DMARC
(1)
DNS Protection
(1)
DVI
(1)
Dropbox
(1)
Electronics overheating
(1)
Ethernet
(1)
Extract
(1)
Fake Antivirus malware
(1)
Favorites
(1)
FiOs
(1)
File format
(1)
Filter
(1)
Firewall
(1)
Fraud
(1)
Full Screen Mode
(1)
Going paperless
(1)
HP Recovery Disk
(1)
Happy Pi Day
(1)
Heathcare IT
(1)
IRS scam
(1)
IT services Boston
(1)
Import
(1)
Internet Explore
(1)
Internet Explorer 9
(1)
Internet meeting
(1)
Intuit
(1)
Junk
(1)
Key
(1)
Layout
(1)
MA Security Law
(1)
MFA
(1)
Marketing
(1)
Merchant Services
(1)
Microsoft Display Adapter
(1)
Microsoft Excel
(1)
Microsoft Outlook tasks
(1)
Microsoft Teams
(1)
Microsoft Windows Update
(1)
Microsoft Word
(1)
Multi-Factor Authentication
(1)
Multiple Tabs
(1)
New Commerce Experience
(1)
Office 2010
(1)
Office 365
(1)
PC
(1)
PC sales
(1)
PIPA
(1)
Patch Policy
(1)
Patches
(1)
Penetration Testing
(1)
Power management
(1)
QuickBooks
(1)
RAM
(1)
Reboot
(1)
Rebuild a computer
(1)
Recent Items
(1)
Reflexion
(1)
Restricting Edits
(1)
Rules
(1)
S.M.A.R.T
(1)
SOPA
(1)
SUM
(1)
Safer Internet Day
(1)
Sand Box
(1)
Sandboxie
(1)
Show the desktop
(1)
Signature
(1)
Sock Drive
(1)
Software Version
(1)
Spyware
(1)
Start Menu
(1)
Surge protector
(1)
Tasks
(1)
TechTax
(1)
Technology Tax
(1)
Templates
(1)
Text Scams
(1)
UPS
(1)
VGA
(1)
Verizon
(1)
View
(1)
WPA2
(1)
Web Filtering
(1)
WebsiteScams
(1)
Wi-Fi
(1)
Windows
(1)
Windows 8
(1)
Windows 8 Consumer Release
(1)
Windows Anytime Upgrade
(1)
Windows Home Server
(1)
Windows Shortcut
(1)
Windows Steps Recorder
(1)
Windows XP
(1)
Wireless
(1)
Work from Anywhere
(1)
X
(1)
Zoom Meeting
(1)
american recovery and reinvestment act
(1)
antivirus
(1)
antivirus projection
(1)
approve sender
(1)
autocomplete
(1)
award
(1)
bitcoin
(1)
business continuity plan
(1)
censorship
(1)
cio
(1)
clean print head
(1)
collaboration
(1)
company policy
(1)
computer graphics, fun tech
(1)
computer keyboard
(1)
computer network
(1)
computer shortcuts
(1)
computer time saver
(1)
computer virus
(1)
cost
(1)
cryptocurrency
(1)
customs
(1)
default passwords
(1)
defragement
(1)
deleted items
(1)
digital signature
(1)
digital transformation
(1)
dust.
(1)
e-waste
(1)
eMail Outlook 2010
(1)
electronic documents
(1)
electronic health record
(1)
electronic signature
(1)
electronics recycling
(1)
email spoofing
(1)
file sharing
(1)
font size
(1)
formula
(1)
fruadulent SSL certificates
(1)
gateway security
(1)
google
(1)
image backup
(1)
incident response plan
(1)
join.me
(1)
laptop loss
(1)
letterhead
(1)
lifecycle
(1)
malware
(1)
managed service provider Boston
(1)
mobility
(1)
network security
(1)
nickname
(1)
on-line backup
(1)
pen test
(1)
popular passwords
(1)
processor
(1)
quarantine
(1)
ransomware protection
(1)
renewal
(1)
responsiveness
(1)
ruler
(1)
scaling up
(1)
scanner
(1)
security patches
(1)
seized laptop
(1)
sharing files
(1)
short cut
(1)
solid state hard drive
(1)
specifications
(1)
startup processes
(1)
support
(1)
technology
(1)
vcio
(1)
web page
(1)
windows 10
(1)
See all tags...
Posts by Month
June 2025
(6)
May 2025
(7)
April 2025
(10)
March 2025
(5)
February 2025
(3)
January 2025
(2)
December 2024
(2)
November 2024
(1)
October 2024
(2)
August 2024
(1)
July 2024
(1)
June 2024
(3)
May 2024
(2)
April 2024
(1)
February 2024
(2)
January 2024
(5)
November 2023
(1)
August 2023
(2)
April 2023
(1)
October 2022
(1)
September 2022
(3)
August 2022
(1)
May 2022
(1)
March 2022
(1)
February 2022
(1)
January 2022
(3)
December 2021
(2)
November 2021
(3)
October 2021
(1)
September 2021
(5)
August 2021
(1)
June 2021
(2)
May 2021
(3)
April 2021
(3)
March 2021
(3)
February 2021
(4)
January 2021
(4)
December 2020
(4)
November 2020
(3)
October 2020
(3)
July 2020
(1)
June 2020
(3)
May 2020
(3)
April 2020
(9)
March 2020
(3)
February 2020
(1)
January 2020
(1)
October 2019
(2)
July 2019
(3)
May 2019
(4)
February 2019
(2)
January 2019
(4)
December 2018
(2)
November 2018
(4)
October 2018
(4)
September 2018
(2)
August 2018
(1)
July 2018
(3)
June 2018
(2)
May 2018
(5)
April 2018
(1)
March 2018
(5)
January 2018
(2)
November 2017
(3)
October 2017
(1)
August 2017
(2)
July 2017
(3)
June 2017
(1)
May 2017
(4)
February 2017
(1)
January 2017
(2)
December 2016
(1)
March 2016
(1)
February 2016
(1)
January 2016
(2)
October 2015
(1)
September 2015
(2)
July 2015
(1)
June 2015
(1)
May 2015
(1)
April 2015
(1)
March 2015
(1)
February 2015
(3)
January 2015
(3)
December 2014
(1)
November 2014
(1)
September 2014
(1)
August 2014
(2)
July 2014
(1)
June 2014
(4)
May 2014
(3)
April 2014
(1)
March 2014
(2)
February 2014
(1)
December 2013
(1)
September 2013
(1)
August 2013
(1)
June 2013
(1)
March 2013
(3)
February 2013
(1)
January 2013
(2)
December 2012
(1)
November 2012
(1)
October 2012
(2)
August 2012
(1)
July 2012
(2)
June 2012
(1)
May 2012
(3)
March 2012
(5)
February 2012
(2)
January 2012
(6)
December 2011
(2)
November 2011
(9)
October 2011
(4)
September 2011
(3)
August 2011
(2)
July 2011
(3)
June 2011
(3)
May 2011
(5)
April 2011
(4)
March 2011
(3)
February 2011
(4)
January 2011
(7)
December 2010
(7)
November 2010
(3)
September 2010
(1)
August 2010
(1)
See all months...
Connect With Us
Older Blog Posts
For older Ekaru blog posts, go to
ekaru.blogspot.com
.