by Matt Logan | Nov 23, 2018 | Computer Security, Computer Operations
Our computers and mobile devices find resources on the Internet using a naming system we call DNS (Domain Name System). DNS converts the names we humans use to browse the web (ex. www.AVAREN.com) and converts them to the IP addresses our computers use to communicate...
by Matt Logan | Nov 19, 2018 | Computer Security, Computer Operations
Occasionally it can become necessary to transmit confidential information (such as account user-names and passwords) to co-workers or family members via electronic means. Because of concerns related to account hacking and ghosting (ghosting being where a hacker...
by Matt Logan | Nov 9, 2018 | Scam Alerts, Computer Security
Email scammers never seem to rest when looking for ways to bypass business spam filters. Sometimes their intent is to encrypt files while holding them for ransom ($$), other times their intent is to simply wreak havoc. Either way, computer users today must be adept at...
by Matt Logan | Nov 2, 2018 | Scam Alerts, Computer Security
No matter how great the spam filter a business employs, the occasional malicious email will still make it through to end users. A decent analogy might be that of a battle of tug-o-war between good and bad actors. The bad actors develop a new kind of spam intended to...