Technology Advisor Blog

Watch Out for Holiday Gift Card eMail Scams

Posted by Ann Westerheim on 11/20/18 5:02 PM

It's the holiday season and people are busy, and it's also a season to beware of scams.  There are many different scams related to gift cards, and here's a new one we just saw locally. 

Read More

Tags: Cybersecurity, email scams, cybersecurity

A Creepy eMail in Your Inbox - Someone Knows Your Password

Posted by Ann Westerheim on 11/12/18 10:02 AM

The Cybersecurity landscape is constantly changing, and there's a new threat to watch out for:  Extortion emails that contain either a past or current password.   We saw a big wave of these emails over the summer and shared a blog post with our community,: A Creepy Twist on Ransomware: Using your Hacked Passwords and we're seeing another wave now, with some more variations.

Read More

How the Dark Web Impacts Small Businesses

Posted by Ann Westerheim on 11/2/18 11:06 AM

Identity theft is an unfortunate occurrence that is all too familiar with most business owners, but do those individuals know where the compromised data will end up? Often, these business owners are unaware of the virtual marketplace where stolen data is purchased and sold by cybercriminals; a place known as the “Dark Web”.

Read More

Tags: cybersecurity, Dark Web

A New Twist on the Microsoft Support Scam

Posted by Ann Westerheim on 11/1/18 10:42 AM

The "tech support" scam is a common threat on the Internet.  While working on your computer, a pop up will appear that says your computer has a problem and help is just a phone call or click away.  Many of these scams pretend to be from Microsoft.  The graphics may look very professional, and the tech jargon sounds convincing enough that may people fall for these scams.  After the "repair" is done, then you'll be asked for a credit card to pay.  Most people assume they won't fall for a scam, but if you're very busy, and the support price is low enough, it could seem like the fastest and most efficient way to get support and get back to work.  

Read More

Tags: cybersecurity, data security

Subscribe by Email

    Most Popular Posts

    Browse by Tag

    See all tags...

    Connect With Us

    Older Blog Posts

    For older Ekaru blog posts, go to ekaru.blogspot.com.