Technology Advisor Blog



Got Electronics? Join Us For Ekaru's Quarterly Electronics Recycling Event!

Posted by Sarah Carroll on 9/18/25 4:45 PM

Aside from Ekaru’s qualified team providing IT solutions and cybersecurity awareness training, we enjoy giving back to our community.

When you purchase a new device such as a laptop, monitor, or a new smartphone, the first step is transferring all your essential data to the new device. Once you’ve transferred all the essentials, you’re left with your former device, inactive and collecting dust on the shelf.
Understanding the materials that create these tools we use in our everyday lives, it’s evident that you cannot just discard these devices in normal everyday trash bins.

Does this resonate that you recently got that new iPhone, MacBook or monitors? That’s where we come in! Our team at Ekaru hosts quarterly electronics recycling events supported by eWaste.

Read More

Tags: computer security, computer, technology, Security Requirements, productivity, small business technology advice., cybersecurity, data security, cybersecurity training, electronics recycling, Cybersecurity, Social Media





What is a Data Breach?

Posted by Ann Westerheim on 1/20/15 4:33 PM

Recently one of our clients got a system infected with a virus and worried about whether or not they needed to report it.  First, it IS possible to get a virus even though you're doing everything right, such as maintaining up-to-date anti virus protection, firewall protection, and security patch updates.  But in most cases, although viruses can create a lot of damage and disruption, no data is exposed to the wrong hands.

Read More

Tags: Security Requirements, breach,





Do you know where your WISP is?

Posted by Ann Westerheim on 3/20/14 8:26 AM

March 1 was the 4th anniversary of the Massachusetts Data Protection Law which was introduced to help protect residents against identity theft and fraud.  The law identifies requirements businesses must follow to secure protected information, which includes a resident's first name or initial and last name, combined with a number of specified protected information including drivers license number, bank account number, social security number, credit card numbers, etc. We've all read the headlines about the major retailers such as Target, Hannafords, and TJX who have been in the news over the years for security breaches, but many small business owners may not be fully aware that the law applies to ALL businesses, large and small.

Read More

Tags: MA Data Security Law, 201 CMR 17.00, Security Requirements





8 Things to Know About the Massachusetts Data Security Law

Posted by Ann Westerheim on 3/28/13 9:32 AM

March is the anniversary of the Massachusetts Data Security Law which went into effect March 1, 2010:  201 CMR 17.00: Standards for The Protection of Personal Information of Residents of the Commonwealth.  The anniversary is a good time to refresh your team about the requirements!

Read More

Tags: MA Data Security Law, 201 CMR 17.00, Security Requirements





Subscribe by Email





    Browse by Tag

    See all tags...


    Posts by Month

    See all months...


    Connect With Us



    Older Blog Posts

    For older Ekaru blog posts, go to ekaru.blogspot.com.