Technology Advisor Blog



Ann Westerheim

Recent Posts

Security updates are boring? Think again. It's the LAW!

Posted by Ann Westerheim on 4/9/15 3:14 PM

Do you read about security updates and your eyes glaze over?  What could possibly be more boring, right?  Well, think again.  The Massachusetts Data Security Law applies to A LL businesses (and non-profits) and ignoring this law won't work.  
Read More




Change the Program Windows Uses to Open a File

Posted by Ann Westerheim on 3/30/15 2:56 PM

Have you ever tried opening a file and found that it opened up in an unexpected program?  Recently, I installed a new PDF editor so I could do more than just view a PDF.  I didn't need the full capabilities of Adobe Acrobat, so I opted for a lower cost program which could do most of what I needed to do, which included just basic edits.  After installing this program, I received a PDF file in an email, and when I opened it, instead of seeing the file in Adobe Reader, it opened in the new program.  It opened fine, but when just reading a PDF, I didn't want to see all the menus for editing a file.  I had inadvertently changed the "File Association" and didn't know it.  This also commonly happens with media files.  We get a few calls about this now and then, and figured it would be useful to post some instructions on how to handle this.

Read More




Get a Text Message Notification for Important eMails

Posted by Ann Westerheim on 2/26/15 8:57 AM

Have you ever been waiting for an important email and stuck filtering through your entire cluttered Inbox to check for it repeatedly until it arrives?  With Ekaru cloud-based Exchange mail, you can set up a Text Message notification so you'll see when the important email arrives without needing to constantly check your Inbox.  

Read More




Wiring Closet / Network Gear: Are you a Felix or an Oscar?

Posted by Ann Westerheim on 2/9/15 12:43 PM

Does your wiring closet look like a neatly organized space or a tangled web of wires and black boxes?  Your wiring closet is where your Internet and phone connections enter your office, and this is the heart of your network infrastructure.  How the area looks isn't about cosmetics, but rather, critical for network up time.
Read More




Seven Questions for your Annual Technology Plan

Posted by Ann Westerheim on 2/5/15 3:20 PM

2015_Technology_PlanIt's that time of year - time for planning.  You may have already completed your yearly plan in the Fall, but if you're like many small businesses, you're wearing many hats and even though January has passed, it's still planning season.

Read More




Is your password 123456? Change it TODAY!

Posted by Ann Westerheim on 1/22/15 1:34 PM

The annual list of the worst passwords for 2014 has been posted.  Last year, there were over three million leaked passwords.  One of the interesting by-products of these leaks is the list of the top passwords.  SplashData posted their list of the top-25 (and therefore, worst!) passwords.  If you see any of your passwords on this list, change it!

Read More




What is a Data Breach?

Posted by Ann Westerheim on 1/20/15 4:33 PM

Recently one of our clients got a system infected with a virus and worried about whether or not they needed to report it.  First, it IS possible to get a virus even though you're doing everything right, such as maintaining up-to-date anti virus protection, firewall protection, and security patch updates.  But in most cases, although viruses can create a lot of damage and disruption, no data is exposed to the wrong hands.

Read More

Tags: Security Requirements, breach,





New Years Computer Security Resolution - Lock your Computer!

Posted by Ann Westerheim on 1/7/15 8:43 AM

It's a new year and time for resolutions. With data security in the news almost every day, and several very high profile breaches last year (Sony, Home Depot, Staples), we recommend data security at the top of your technology plan for 2015.  
Read More




Team Collaboration - Sync and Share in the Cloud

Posted by Ann Westerheim on 12/11/14 9:04 AM

With remote working and team collaboration now commonplace, employees demand anytime, anywhere access to their work files.  When the workplace lacks these tools, employees take productivity into their own hands using their personal mobile devices and free or low cost consumer grade productivity apps to get stuff done.  What they may not know is that these devices and consumer grade solutions typically lack the rigid security requirements that businesses demand and therefore are unintentionally introducing risk into the workplace.  In order to minimize risk and maintain a secure environment, you need to standardize and develop use policies around data access.  A good place to start is to standardize on your file sync and share solution.  Let us help you make that transition easily and securely.

Read More




Homeland Security Posts Alert for Windows 2003

Posted by Ann Westerheim on 11/17/14 10:50 AM

The Department of Homeland Security has issued an alert for Windows Server 2003 (TA14-310A).   Microsoft is ending support for the Windows 2003 Operating System on July 14, 2015. After this time you will no longer receive security patch updates to protect against viruses, malware and other security threats.  There will also no longer be any software updates or technical support available from Microsoft after this time.

Read More




Subscribe by Email





    Browse by Tag

    See all tags...


    Posts by Month

    See all months...


    Connect With Us



    Older Blog Posts

    For older Ekaru blog posts, go to ekaru.blogspot.com.