Technology Advisor Blog



Cybersecurity Basics: What Is Multi-Factor Authentication and Why Does It Matter?

Posted by Sarah Carroll on 6/13/25 7:23 PM

Before social media and the responsibility of maintaining multiple accounts, folks tended to keep their passwords written down on paper, stored in what they considered a safe place, or saved into their phone. These are dangerous cybersecurity risks being practiced and they need to be addressed promptly.
The problem is passwords are often weak, reused or exposed in personal data breaches that are out of your control. In the last decade, we have been introduced to Password Managers and following right after, Multi-Factor Authentications (MFA). Both provide thorough measures to protect users’ information and safety. As an effect, this shield has caused bad actors to get creative and find other tactics to infiltrate your systems.
We’re going to go over what MFA is and why it matters to implement for your small business and in personal life or really, anywhere it’s available!

Read More

Tags: security protection, Monitoring, small business technology advice., cybersecurity, Privacy, security awareness training, cybersecurity training, managed IT services in Boston, Multi-Factor Authentication, MFA





Local Targets: Spoofing Scams Are Closer Than You Think

Posted by Sarah Carroll on 6/5/25 12:14 AM

Before AI consumed our media on a daily basis, spoofing would often impersonate important figures in our lives with the malicious intent of sending misinformation for money and spreading malware. Now with AI, it has become even harder to identify these attempts to protect our friends and loved ones from the headache known as cybercrime.

Read More

Tags: computer security, cybersecurity, ransomware, cybersecurity, spoofing, cybersecurity training, Caller ID Scam





Daily AI, Daily Dangers? A Wake-Up Call for Smart Use

Posted by Sarah Carroll on 5/30/25 12:23 PM

By this weekend, we will be halfway through 2025. It’s mind-boggling how quickly the year passes by when you take a moment to reflect. But also, how scammers can consistently create powerful, malicious tools using AI in high volumes.

Read More

Tags: Desktop, business continuity, Internet usage, cybersecurity, ransomware, cybersecurity, ChatGPT, Artificial Intelligence





Cyber Insurance: What Small Businesses Don't Know Can Hurt Them

Posted by Ann Westerheim on 5/21/25 5:01 PM

Cybersecurity Insurance for small business offers protection that standard business coverage often overlooks. Your company faces mounting risks from data breaches, ransomware attacks, and operational disruptions due to cyber incidents - problems that traditional insurance policies were not built to handle.

Read More

Tags: small business, cybersecurity, Cyber Insurance





How AI is Making Phishing Attacks Smarter - What Small Businesses Must Do Now

Posted by Ann Westerheim on 5/14/25 9:48 AM

 

How hackers use AI for phishing attacks has become more advanced, making standard email security measures inadequate for protection. Modern cybercriminals leverage artificial intelligence to create convincing emails with flawless grammar, personal details from social media, and context-aware content that can deceive your most alert employees.  No more language barriers in cyber crime!

Read More

Tags: phishing, Cybersecurity, email scams, cybersecurity, cybersecurity training, Artificial Intelligence





Click Happens - Human Error Remains The #1 Cyber Risk

Posted by Ann Westerheim on 5/6/25 5:13 PM

Every year, Verizon publishes a Data Breach Investigation Report (DBIR). The Verizon DBIR is one of the most comprehensive reports illustrating REAL security incidents and breaches, not just hypothetical "this could happen" warnings.  The 2025 Report - the 18th annual report! -  was published on April 23, 2025 and as usual, its full of inciteful information for both small business AND enterprise. To generate the report, the Verizon DBIR team analyzed 22,053 real-world security incidents, of which 12,195 were confirmed data breaches. 

Read More

Tags: small business technology advice., cybersecurity, ransomware, cybersecurity, data security, incident response, SecurityBreach





April 2025: A Wake - Up Call for Healthcare Cybersecurity

Posted by Sarah Carroll on 5/2/25 3:00 PM

With the start of the new month and Tax season now over, cybercriminals are beginning to shift their focus on to new trends. This time targeting tech and healthcare giants for patient sensitive information out by the millions.
I’m sure you all have heard it before ‘I’m just one person and keep my circle small, I’m not going to fall victim to a cybercrime. I’m so careful.’ Or even; “I just use the necessities and take what I believe are the cautionary steps”. Until you’re not. Even just this morning a colleague received a phishing text claiming they saw their ‘resume’ and had a job opening with no further context. They pointed out the message’s red flags, which included a high amount of compensation for said job, no description of position or company name and contact information did not match. As annoying as it is to receive these types of unwanted messages, the attempt likely came from the individual placing their email to receive newsletters & updates of a product and service of their choosing. Not expecting their email or any other additional information to be involved for phishing attempts.

Read More

Tags: computer security, small business technology advice., cybersecurity, ransomware, cybersecurity, data security, incident response





DMARC Gets Serious: Microsoft Enforces Stricter Email Rules

Posted by Ann Westerheim on 4/30/25 4:47 PM

Starting May 5, 2025, all businesses - regardless of size - must meet Microsoft’s stricter email authentication requirements when sending to Outlook, Hotmail, and Live addresses. These changes are designed to reduce spoofing and impersonation, aligning with similar updates from Google and Yahoo to improve overall email security.

Read More

Tags: eMail, SPF record, Cybersecurity, email scams, cybersecurity, DMARC





Spring Cleaning for your Cybersecurity: 10 Things You're Probably Overlooking

Posted by Ann Westerheim on 4/29/25 4:25 PM

Just like your home needs a good spring cleaning, your technology and data need regular organization too. Cybersecurity best practices act like a home organization system for your digital life - keeping your accounts, passwords, and access permissions tidy, updated, and secure. This guide will show you proven methods in protecting your information while making sure your systems run smoothly using smart organization techniques. Learning the straightforward steps to defend yourself against current threats and build a more secure foundation for your business and personal data.  Cleaning out your closets this Spring?  Make sure you take care of your digital clutter as well!

Read More

Tags: computer security, strong passwords, security protection, Cleaning your computer, data backup, cybersecurity, Privacy, cybersecurity training, General





Cybercrime Soaring in the 2020s - Businesses and People at Risk

Posted by Sarah Carroll on 4/25/25 12:35 PM

With the development of generative AI becoming more sophisticated for both positive and malicious intent, it’s no surprise there has been an increased surge of cybercrime happening all around the world.
In 2024 alone, we can see these reflect in the 33% increased losses in the US compared to the previous year 2023. According to the FBI Internet Crime Complaint Center (IC3), losses from cybercrime in 2024 exceeded $16 billion, with the top three causes of financial loss stemming from phishing, extortion, and personal data breaches. Important note: When it comes to data incidents, the difference in context is that data incidents are suspicious activity occurring across accounts. A data breach refers to the confirmation of systems being given unauthorized access with malicious intent with financial loss.

Read More

Tags: phishing, Cybersecurity, email scams, cybersecurity, Artificial Intelligence





Subscribe by Email





    Browse by Tag

    See all tags...


    Posts by Month

    See all months...


    Connect With Us



    Older Blog Posts

    For older Ekaru blog posts, go to ekaru.blogspot.com.