Technology Advisor Blog



Sarah Carroll

Recent Posts

Homograph Attack-Font Characters Hidden In Plain Sight

Posted by Sarah Carroll on 11/6/25 10:14 AM

In Ekaru’s previous blog, we went over how typos can unexpectedly lead you to mimicked websites designed by hackers to steal your personal information. But what if I told you that on top of having to be hyper vigilant of spelling, you also need to check a URL’s characters if all letters are from the same font?
Tricks hackers use to scam unsuspecting individuals usually consist of spam texts, phishing emails impersonating reputable companies, scams claiming you owe a specific amount of money, creating a sense of urgency - all are attempts to fatigue you and steal your information. For some, these tricks have become easy to spot due to recognizing the signs from their intensive cybersecurity awareness training. However, bad actors use evolving technology and strategies to improve their game and become harder and harder to detect.
One of their strategies to become harder to detect, is the usage of visuals in random letters from different fonts. This is a term we call Internalized Domain Name (IDN) Homograph attack.

Read More

Tags: phishing, Monitoring, technology, small business technology, small business technology advice., Cybersecurity, email scams, cybersecurity, DNS Protection, Homograph Attack





Typo Squatting: It'll Make Sure Think Twice About a Misspelled Website Domain

Posted by Sarah Carroll on 10/31/25 11:04 AM

As we enter Halloween, the larger national holidays such as Thanksgiving and Christmas are closing in. It’s a stressful time of year, causing a lot of folks to not act rationally how they usually would. Scammers are aware of this more than ever and will do whatever it takes for you to fall into their trap. How do they try to get you? Sometimes it’s not as obvious, sometimes its overlooking how a website HTTP link is typed out incorrectly. The term for this type of social engineering scam is called Typo squatting.

Read More

Tags: Cybersecurity, email scams, cybersecurity, Cybersecurity Awareness Training, Typo Squatting





AWS Global Outage-The Importance of Backup Drives For Business & Personal Use

Posted by Sarah Carroll on 10/24/25 9:59 AM

As many of us have our head in the clouds for Halloween that is on a Friday this year, something spookier has grabbed folks’ attention this week. On Monday October 20th, people noticed that something was off. Social media apps taking minutes to send messages or to send at all, streaming shows not loading properly, difficulties in sending deposits through Venmo, or even grabbing a drink from Starbucks and their POS systems are down. The cause: AWS had an outage that lasted for over half a day on Monday (great way to start off the week amiright?) For many, frustration and eagerness took over as they could only wait for this to be resolved. But just how many internet services and applications were affected?

Read More

Tags: electronic documents, network security, cybersecurity, Internet Outage, google, AWS Outage, AWS





Networks are The Powerhouse of a Business, They Must Be Protected

Posted by Sarah Carroll on 10/17/25 11:28 AM

When keeping business operations alive, security is essential. Security isn’t just strong passwords of 16 or more characters across multiple different websites/accounts, or MFA, it’s a deeper-rooted step to take with your networks to prevent most cybersecurity threats.
From a 2021 Verizon study, “61% of small to mid-size businesses experienced a cyberattack in 2021”. In 2023 73% of small businesses faced cyber-attacks. In 2024, 94% of small to medium sized businesses faced a cybersecurity attack. The number keeps increasing each year with small businesses affected. Something must be done to protect businesses from such cyber attacks.


The mindset has probably come up multiple times in conversation; “I’m a small business, I’m too small to be known for hackers to try and target me”. It’s not exactly if it happens, it all matters as to when. Don’t wait until that ‘when’ turns into ‘today’ when you receive a socially engineered scam that looks legit. Scams are becoming harder to identify, when you are not investing in proper cybersecurity measures, the wrong people will notice you do not have the tools or budget.

Read More

Tags: security protection, support, technology, network security, malware, security awareness training, online safety, Cybersecurity Awareness Training





MFA is Essential; Even if You Do Not Want Anything Work Related on Your Phone

Posted by Sarah Carroll on 10/10/25 10:21 AM

Are you someone that does not want any trace of work on your phone with the intent of separate work from home? Well, you’re not alone.
It’s understandable that you would want to have a personal device that has no affiliation to work or receive any work-related phone calls. However, with threat actors ruthlessly and creatively generating scams for folks to fall victim to, it’s important to understand the benefits of using multi factor authentication across multiple devices.

Read More

Tags: Phone System, Cybersecurity, email scams, Multi-Factor Authentication, MFA, Cybersecurity, Travel, Cybersecurity Awareness Training





Cold Weather Setting In, Cold Call Scams (Vishing) Are on The Rise

Posted by Sarah Carroll on 10/7/25 4:29 PM

October is here, and threat actors are ramping up their attacks to the point where its… spooky.
While Halloween is coming up, Thanksgiving and Christmas are also on the horizon, it’s more evident than ever we must remain hypervigilant and not fall for these intricate phishing attempts.

In September, many folks and including some of us in the office, experienced a rise in spam (Vishing) phone calls. You may be wondering ‘Where are all these unknown numbers coming from?” If you’re like me, when you notice an unknown caller ID notify your phone, you never pick up. However, not everyone is like that. However, the Ekaru team is here to teach you all about cold calling scams, how to identify them, reasons why they are potentially occurring, and the steps/services we provide to help protect yourself and others from falling into their trap.

Read More

Tags: small business, security protection, small business technology, small business technology advice., Phone System, cybersecurity, ransomware, cybersecurity, security awareness training, cybersecurity training, Cybersecurity Awareness Training





Choosing the Right MSP For Your Businesses Needs-Why Ekaru Is a Great Fit

Posted by Sarah Carroll on 10/3/25 12:14 PM

When businesses become further established and credible within their community, the conversations of increasing security measures, budgeting, and overall work morale begin to initiate for further discussion. Understandably, maintaining a growing business can be challenging and shifting your priorities, sometimes causing the complacent “My business won’t get hacked, I’m safe it won’t happen to me.” This type of thinking can backfire especially if you’re not paying close enough attention - there is no "Security by Obscurity"!  At the end of the day, we have all been there and sometimes had to pay for the consequences.
Since there are so many aspects to a business that can pull you in several directions at once it’s hard to pinpoint where to begin conversations on cybersecurity needs. That’s where Ekaru comes in to provide you with the best IT solutions in the Boston Massachusetts area. To make informed decisions about your cybersecurity needs aligned within your budget.

Read More

Tags: small business, responsiveness, Monitoring, support, small business technology advice., cybersecurity, online safety, Cybersecurity, Social Media, Cybersecurity Awareness Training





Got Electronics? Join Us For Ekaru's Quarterly Electronics Recycling Event!

Posted by Sarah Carroll on 9/18/25 4:45 PM

Aside from Ekaru’s qualified team providing IT solutions and cybersecurity awareness training, we enjoy giving back to our community.

When you purchase a new device such as a laptop, monitor, or a new smartphone, the first step is transferring all your essential data to the new device. Once you’ve transferred all the essentials, you’re left with your former device, inactive and collecting dust on the shelf.
Understanding the materials that create these tools we use in our everyday lives, it’s evident that you cannot just discard these devices in normal everyday trash bins.

Does this resonate that you recently got that new iPhone, MacBook or monitors? That’s where we come in! Our team at Ekaru hosts quarterly electronics recycling events supported by eWaste.

Read More

Tags: computer security, computer, technology, Security Requirements, productivity, small business technology advice., cybersecurity, data security, cybersecurity training, electronics recycling, Cybersecurity, Social Media





What's New: Back To School Cybersecurity Checklist

Posted by Sarah Carroll on 9/2/25 5:13 PM

For those that are heading back into the school education system, student, teacher, or administrative professional, this blog is just for you!
In the summertime, business general activity is low, however cybercriminals utilize this time to calculate an abundance of phishing scams to isolate, rush, and cause anxiety within the victim. Once fall hits, these tactics are no different, just using another mask to hide their cyber threats in plain sight.

Read More

Tags: Monitoring, business continuity, cybersecurity, ransomware, cybersecurity, cybersecurity training, Security Awareness, IT services Boston, Artificial Intelligence





Business Safety from Cyber Attacks Is as Important as Your Personal Safety

Posted by Sarah Carroll on 8/26/25 4:41 PM

For a lot of us, to put our best selves forward, we need peace of mind that ‘home’ is safe. According to USA Today, devices such as Ring, wyze and other forms of surveillance cameras have seen a significant increase in popularity for folks to monitor their own front door, their children or pets while on a trip, or just simply having that confirmation that your significant other arrived home safely. In other cases, it provides full streaming, detecting motion indoors/outdoors, two-way talk, and more.

Read More

Tags: Monitoring, business continuity, cybersecurity, cybersecurity training, Cybersecurity, Travel





Subscribe by Email





    Browse by Tag

    See all tags...


    Posts by Month

    See all months...


    Connect With Us



    Older Blog Posts

    For older Ekaru blog posts, go to ekaru.blogspot.com.