Have you experienced an increase in the number of "local" junk calls to your cell phone? You're not alone. Scammers have yet another tactic to get through to you by "spoofing" a phone number. When your phone rings and you see a local number, you're more likely to pick up. After you pick up, your number is proven to be a "real" number which is more valuable to scammers and the number of calls increases.
Read MoreTechnology Advisor Blog
Ann Westerheim
Recent Posts
Tags: cybersecurity, spoofing
In case you missed it: Last week we hosted a technology lunch and learn event with our partner, Jive Communications. Local business owners enjoyed networking, lunch, and technology.
Read MoreA few clients have asked us about recent notifications received from Network Solutions (and others): "Action Required: Notice Regarding Your Domain Name(s)". In this day and age, we recommend that all users stay alert when opening email, and we welcome questions about the legitimacy of received mail - better safe than sorry!
Read MoreTags: eMail, Internet, web site
The FBI has issued an important warning about certain consumer-class routers after a massive malware attack was detected. Turning the router off, then on again is a simple and important step to help stop the malware. Additionally, it's recommended that you update the password and make sure the firmware is up to date. The malware is capable of blocking traffic, collecting information that's transmitted through the device, and disabling devices entirely.
Read MoreTags: cybersecurity, malware
Cybersecurity - What is the cost to Small Businesses? Another factor to think about related to Microsoft Security Patches...
Posted by Ann Westerheim on 5/14/18 10:55 AM
We've all seen the headlines of the major cybersecurity incidents: Target, Yahoo, Equifax, Sony, etc... Cybersecurity is a topic that affects everyone, and we view it as a public safety issue. With all the headlines over the past years, at this point, most people "get it" that cybersecurity is a big problem, but the education can't stop there.
Read MoreTags: cybersecurity, ransomware, cybersecurity
Ekaru Now Delivers Dark Web Monitoring Services through ID Agent Partnership
Posted by Ann Westerheim on 5/9/18 8:29 AM
Ekaru Offers Monitoring and Alerting of Stolen Digital Credentials, Increasingly Valuable Asset on Dark Web
Read MoreTags: cybersecurity, data security
In case you missed it... here's a review of our latest webinar on cybersecurity from earlier today.
Read MoreTags: training, cybersecurity
Cybersecurity is a LOCAL issue - Massachusetts school district pays $10,000 ransom to unlock its files after cyber attack.
Posted by Ann Westerheim on 5/2/18 3:59 PM
This past week a Massachusetts school district paid $10,000 ransom to unlock its files after a cyber attack. The Police Chief commented that there is no further investigation of this crime because solving this crime is "impossible". This is unfortunately a sign of the times.
Read MoreTags: Cybersecurity, email scams, cybersecurity, ransomware, cybersecurity
Sending an email to more than just a few recipients? DON'T hit the send key before reading this....
Posted by Ann Westerheim on 4/16/18 3:54 PM
You need to send an important update or invitation to all your clients and you're ready to hit the "send" key. Don't!
Read MoreTags: eMail, email security
We hope you're keeping up with organizing your "Inbox" in Outlook using different folders to group your mail. You may also want to organize your "Sent Items" folder into different sub-folders. Perhaps you have some company related emails you want to group or perhaps you want to track your sent items by major projects. If you add a sub-folder, you may be alarmed to see that all the mail is listed with your name. As you can see below, my messages in my newly created "TEST FOLDER" folder for sent messages are all listed by who sent the message. Me! Not helpful. I already know who sent them!
Read MoreTags: Microsoft Outlook