Starting May 5, 2025, all businesses - regardless of size - must meet Microsoft’s stricter email authentication requirements when sending to Outlook, Hotmail, and Live addresses. These changes are designed to reduce spoofing and impersonation, aligning with similar updates from Google and Yahoo to improve overall email security.
Read MoreTechnology Advisor Blog
Ann Westerheim
Recent Posts
DMARC Gets Serious: Microsoft Enforces Stricter Email Rules
Posted by Ann Westerheim on 4/30/25 4:47 PM
Tags: eMail, SPF record, Cybersecurity, email scams, cybersecurity, DMARC
Spring Cleaning for your Cybersecurity: 10 Things You're Probably Overlooking
Posted by Ann Westerheim on 4/29/25 4:25 PM
Just like your home needs a good spring cleaning, your technology and data need regular organization too. Cybersecurity best practices act like a home organization system for your digital life - keeping your accounts, passwords, and access permissions tidy, updated, and secure. This guide will show you proven methods in protecting your information while making sure your systems run smoothly using smart organization techniques. Learning the straightforward steps to defend yourself against current threats and build a more secure foundation for your business and personal data. Cleaning out your closets this Spring? Make sure you take care of your digital clutter as well!
Read MoreTags: computer security, strong passwords, security protection, Cleaning your computer, data backup, cybersecurity, Privacy, cybersecurity training, General
Do small businesses need cybersecurity? YES! Data shows that half of all cyber attacks target small organizations, making them prime targets alongside large corporations. Major security breaches at Fortune 500 companies grab headlines, yet local businesses, nonprofits, and municipalities face ongoing threats that can expose donor databases, financial records, and private customer details. Each year, Verizon publishes the Data Breach Investigations Report which is loaded with statistics on the latest updates on real-world breaches. Reports like this make it clear: small businesses aren't flying under the radar - they're in the crosshairs. Understanding real-world breach data helps you prepare, protect and stay resilient.
Read MoreTags: small business, cybersecurity, incident response
Keyboard Shortcuts – These are a few of my favorite things!
Keyboard shortcuts are one of the simplest ways to boost your productivity - yet they're often overlooked. These quick key combinations help you navigate, format, and multitask faster without ever taking your hands off the keyboard. Whether you're writing emails, managing files, or working in Microsoft 365, learning a few key shortcuts can save minutes every day and hours over time. It’s a small change with a big payoff!
Read MoreTags: small business technology advice., cybersecurity, Computer Tip
If You've Never Thought of Cybersecurity, You're Exactly Who The Cyber Criminals Want
Posted by Ann Westerheim on 4/9/25 9:26 AM
Cybersecurity and AI have become inseparable forces that create immediate risks to local businesses, regardless of size. Small organizations are now prime targets for criminals who use artificial intelligence to automate attacks, making every business vulnerable.
Major corporate breaches grab headlines, yet the silent wave of cyber attacks on local companies goes unreported, leaving many business owners with a dangerous false sense of safety. Your organization needs basic protective steps that could prevent most attacks, along with cost-effective solutions to shield your business from financial losses and reputation damage. The stakes are high - companies that fall victim to these attacks often struggle to keep their doors open.
Read MoreTags: small business technology advice., Cybersecurity, email scams, cybersecurity training
Why Delaying a Written Information Security Plan (WISP) Could Be Your Business's Costliest Mistake
Posted by Ann Westerheim on 4/1/25 4:03 PM
A Written Information Security Plan (WISP)acts as your small business's shield against cyber threats, protecting both your data and financial health. Research shows 43% of cyber attacks target small businesses directly, making clear protocols and response strategies a must-have for your operations. Verizon 2024 Data Breach Investigations Report
Tags: service, disaster recovery, small business technology advice., cybersecurity, security risk assessment, ransomware recovery, SecurityBreach
Regret to Resilience: What Small Businesses Learn After a Cyber Incident
Posted by Ann Westerheim on 3/25/25 3:11 PM
What to do after a cyber attack requires fast, strategic action to protect your business and stop further damage. A well-planned response can mean the difference between a brief disruption and a complete business shutdown that costs hundreds of thousands of dollars.
Your response in the first 24 hours shapes your recovery path and impacts your ability to resume operations. This guide outlines the proven recovery methods that have helped businesses survive attacks and rebuild stronger, plus practical steps to prevent future incidents from harming your operations. You'll learn exactly which actions to take, who to call, and how to minimize both financial losses and operational downtime.
Tags: small business, small business technology advice., cybersecurity, incident response
Five Smart IT Cost Management Ideas for Growing Businesses
Posted by Ann Westerheim on 3/13/25 4:06 PM
IT spending choices directly impact your bottom line, with cloud solutions offering clear ways to control costs while building capabilities. Your technology investments - from email systems to cybersecurity tools - keep your company competitive without creating budget surprises. I recall a conversation I had with a client years ago - a local business owner with about 25 employees - he said; "Ann, I just need all my tech to work, and at a reasonable price". A lot has changed over the years - tech is so much more pervasive everywhere, and managing cyber risk is now a big part of it. But the bottom line is the same: IT spending choices directly impact your bottom line.
Read MoreTags: small business technology, cybersecurity
Sweetheart Scams & Cyber Threats: Don’t Let Hackers Steal Your Heart… or Your Money
Posted by Ann Westerheim on 2/4/25 2:46 PM
February is here, and with Valentine's Day approaching, love is in the air - and online. But while people are searching for romance, cybercriminals are hunting for their next victim. Romance scams aren’t just a personal threat; they’re also a serious business risk. As employees blur the lines between personal and work device usage, scammers see an opportunity to infiltrate networks, steal credentials, and drain bank accounts. A single compromised account or financial scam can put an individual or an entire business at risk. Don’t let cybercriminals turn hearts - and your company’s security - into their next target.
PCI Compliance & Beyond: What DMARC Means for Your Business
Posted by Ann Westerheim on 1/30/25 10:02 AM