Technology Advisor Blog



Ann Westerheim

Recent Posts

When Security Updates Cause a Tech Meltdown: Why Your Business Still Needs Robust Cybersecurity

Posted by Ann Westerheim on 7/22/24 2:54 PM

On Friday July 19, 2024, the world woke up to a major tech outage as a routine update from security software vendor CrowdStrike inadvertently caused computers to crash worldwide. Flights were cancelled, hospitals were shut down, and banking was disrupted. CrowdStrike clarified early in the day that the incident was NOT a cyber attack, but rather a (really) bad update, and a fix was available pretty quickly.  Still, undoing the damage was a major effort.  What can we learn from this?

Read More

Tags: cybersecurity, CrowdStrike





Protect Your Business:  How to Spot and Prevent Domain Spoofing Scams

Posted by Ann Westerheim on 6/28/24 9:39 AM

The more you know about the various types of cyber scams out there, the safer you'll be online. We recently received a question from someone in our community who's doing a lot of hiring and reported that someone had posted a job on a spoofed website - "domaincareers.com" instead of "domain.com".  Why do scammers do this?  They're trying to trick people into providing personal information like a social security number and possibly financial information so they can steal it.  It is true that before you start a job, you'll need to give your employer your social security number and you'll probably want to set up direct deposit of a paycheck, but if a company is asking for this information too early, its a scam.   Both employers and potential employees need to know about these scams.

Read More

Tags: domain name, cybersecurity





Business Continuity Planning for Boston Area Companies

Posted by Ann Westerheim on 6/25/24 11:41 AM

Business continuity planning helps your business operate nearly seamlessly in the event of a natural disaster, critical hardware malfunction, or even a cybersecurity breach. These events can cripple or even destroy your organization. But when you take precautions now before such things happen, you save yourself massive headaches down the road.

Read More

Tags: cybersecurity, business continuity plan





Boston Data Security Services: Why Data Protection Matters

Posted by Ann Westerheim on 6/21/24 2:16 PM

Data security in Boston, and other major business centers, is becoming a pillar of business readiness, as leaders look to proactively protect their business data.

Read More

Tags: cybersecurity, cybersecurity training, Cyber Insurance





Ransomware Protection in Boston: 5 Things You Must Do

Posted by Ann Westerheim on 5/6/24 2:42 PM

Ransomware protection for your Boston area business can save you from going out of business. What would you do if your files and essential data suddenly became inaccessible, stolen, and sold on the dark web? Could you operate critical business functions without this data?

Read More

Tags: ransomware, ransomware recovery, ransomware protection, Boston Ransomware





Virtual CIO Services: Hiring a Competent Boston Area VCIO

Posted by Ann Westerheim on 5/3/24 1:40 PM

Hiring an experienced full-time Chief Information Officer can be expensive, especially for small businesses. Fortunately, using virtual CIO services, or hiring a VCIO, can be just as effective. Besides saving businesses money, a virtual CIO can still help companies achieve the benefits of an efficient, high-functioning IT network while also helping establish safeguards to prevent cybersecurity threats.

Read More




Cybersecurity Training for Board of Directors: A Full Guide

Posted by Ann Westerheim on 4/12/24 3:04 PM

This guide will explain not only why cybersecurity training for board of directors is important, but also give you the critical questions that boards should be asking their CEOs and themselves to address their organization's cyber defenses.

Read More

Tags: Cybersecurity training for a board of directors





Simple Cybersecurity: Budget-Friendly Vulnerability Scans for SMBs

Posted by Ann Westerheim on 2/7/24 5:06 PM

Vulnerability scanning is a cybersecurity service designed to identify, assess, and help manage security weaknesses in your computer systems, networks, and software. Think of it as a health check-up for your business's digital environment. This service uses specialized software tools to scan for known vulnerabilities, such as outdated software, missing security patches, or configurations that could easily be exploited by hackers.  We talk to a lot of small businesses in the greater Boston area, and we're seeing more and more insurance companies and banks ask for vulnerability scans.

Read More

Tags: cybersecurity, Cyber Insurance





The CIO Effect: Transforming Small Business with Big Tech Strategies

Posted by Ann Westerheim on 2/2/24 3:11 PM

Large corporations have a Chief Executive Officer, a Chief Operating Officer, a Chief Financial Office, a Chief Information Officer - and maybe some more "Chiefs" on the team.  Each plays a separate and vital role moving the business forward.   While smaller organizations can't afford to have so many full time employees at the top, there's no reason you can't benefit from the vital role the Chief Information Officer (CIO) can play in your organization - maybe just on a fractional or virtual basis.

Read More

Tags: small business, small business technology, small business technology advice., vcio, cio





Outsmarting QR Code Scams: Your Guide to Spotting and Stopping Them

Posted by Ann Westerheim on 1/25/24 4:39 PM

QR codes, short for Quick Response Codes, are the gateway between the physical and digital realms, offering a seamless bridge in our interconnected world.  Just point your camera at a QR Code and you'll be conveniently directed to a website.  Easy, right?   However, their simplicity and widespread adoption have opened the door for innovative cybercriminals to exploit. These tech-savvy fraudsters ingeniously manipulate QR codes, turning them into tools for executing scams, potentially leading to significant security breaches and financial damage. As a small business owner in the digital age, it's imperative to understand the nature of QR code scams and the strategies to effectively recognize and thwart them. This article will arm you with essential tips and insights, empowering you to safeguard your business against the hidden dangers of these seemingly innocuous codes.

Read More

Tags: Managed Services, cybersecurity, cybersecurity training





Subscribe by Email





    Most Popular Posts



    Browse by Tag

    See all tags...


    Posts by Month

    See all months...


    Connect With Us



    Older Blog Posts

    For older Ekaru blog posts, go to ekaru.blogspot.com.