Technology Advisor Blog



Ransomware:  Don't be a victim!

Posted by Ann Westerheim on 10/23/18 2:26 PM

We hear routinely in the news that a major corporation or government agency has had its data integrity compromised, with millions of pieces of personal data accessed. In these cases the criminals behind the attack hope to get money by selling that data to other criminals. In the case of ransomware, the criminals want your money, and try to get it by holding your data hostage. Plain, old fashioned kidnapping with a hi-tech spin.  It's not about how much your data is worth to them, it's about how much it's worth to you.
Read More

Tags: cybersecurity, ransomware





You've Got Ransomware... Now What?

Posted by Ann Westerheim on 10/16/18 3:36 PM

If you're unfortunate enough to be the victim of a ransomware attack, there are basically only three options open to you. Ransomware is a type of computer virus that kidnaps your data and holds it hostage for money. It has become increasingly common attacking governments and all manner of business and non-for profit institutions.  These are often automated attacks that are broadly distributed, so even if you're a small business you're still at risk.  Too many small businesses think they're "under the radar" and in fact, about half of ransomware attacks hit small businesses.
Read More

Tags: cybersecurity, ransomware, cybersecurity, SMB





5 Surprising Tech Trends Boosting Small Business Growth

Posted by Ann Westerheim on 10/5/18 9:26 AM

Running a small business is exciting but also very risky. American business owners and managers spend countless hours building enterprises that bring value to the table. However, their survival rate doesn't look rosy according to recent statistics. Approximately 80% of businesses survive their first year, 50% survive their fifth year, and 30% survive their tenth year. The fact that their failure rate only increases over time is cause for concern.

Read More

Tags: cybersecurity, SMB





Wait a minute! The minute by minute cost of Cybercrime

Posted by Ann Westerheim on 8/29/18 5:17 PM

The cost of cybercrime is no joke. This is easy to say from the perspective of someone whose business it is to know all about cybercrime trends, attack vectors, etc.  But to really quantify how big of a problem cybercrime is in the world of business, it is often easier to compare it to day to day things… like a doctor explaining a complicated procedure or a mechanic telling you why your car is making that noise. So today I would like to compare the cost of cybercrime to the most universal understanding that there is… time.

Read More

Tags: cybersecurity





Cybersecurity is Everyone's Job - Recommended Summer Reading.

Posted by Ann Westerheim on 7/24/18 2:56 PM

A new NIST (National Institute of Standards and Technology) guidebook says Cybersecurity is everyone's job.  While many people may believe that cyber threats are a technology problem looking for a technology solution, the data shows otherwise:  people are the weakest link.  Whether your organization is large or small, a mindset of security and ongoing user education will help keep your data safe.  Sometimes all it takes is ONE user clicking on the wrong link to cause a lot of damage.  

Read More

Tags: cybersecurity





A Creepy Twist on Ransomware - Using your hacked passwords

Posted by Ann Westerheim on 7/19/18 10:21 AM

Recently there have been many reports on a clever twist on an old scam that's made more believable with your hacked password.  The email purports to be from a hacker who has compromised your computer and recorded you watching porn and will release the information to all your contacts if you don't pay the ransom (payable to a crypto currency account so it's not traceable).   

Read More

Tags: cybersecurity, ransomware, cybersecurity





Another Scam to Watch Out For:  "Neighbor Spoofing"

Posted by Ann Westerheim on 7/10/18 9:30 AM

Have you experienced an increase in the number of "local" junk calls to your cell phone?  You're not alone.  Scammers have yet another tactic to get through to you by "spoofing" a phone number.  When your phone rings and you see a local number, you're more likely to pick up.  After you pick up, your number is proven to be a "real" number which is more valuable to scammers and the number of calls increases.  

Read More

Tags: cybersecurity, spoofing





Got a consumer class router?  Power cycle it NOW!

Posted by Ann Westerheim on 5/29/18 4:02 PM

The FBI has issued an important warning about certain consumer-class routers after a massive malware attack was detected.  Turning the router off, then on again is a simple and important step to help stop the malware.  Additionally, it's recommended that you update the password and make sure the firmware is up to date.  The malware is capable of blocking traffic,  collecting information that's transmitted through the device, and disabling devices entirely.

Read More

Tags: cybersecurity, malware





Cybersecurity - What is the cost to Small Businesses? Another factor to think about related to Microsoft Security Patches...

Posted by Ann Westerheim on 5/14/18 10:55 AM

We've all seen the headlines of the major cybersecurity incidents:  Target, Yahoo, Equifax, Sony, etc... Cybersecurity is a topic that affects everyone, and we view it as a public safety issue.  With all the headlines over the past years, at this point, most people "get it" that cybersecurity is a big problem, but the education can't stop there.   

Read More

Tags: cybersecurity, ransomware, cybersecurity





Ekaru Now Delivers Dark Web Monitoring Services through ID Agent Partnership

Posted by Ann Westerheim on 5/9/18 8:29 AM

Ekaru Offers Monitoring and Alerting of Stolen Digital Credentials, Increasingly Valuable Asset on Dark Web

Read More

Tags: cybersecurity, data security





Subscribe by Email





    Browse by Tag

    See all tags...


    Posts by Month

    See all months...


    Connect With Us



    Older Blog Posts

    For older Ekaru blog posts, go to ekaru.blogspot.com.