Benefits of Cloud Computing
The benefits of cloud computing for small businesses.
The “Change My Details” Scam
Email scams have become increasingly sophisticated in recent years, with scammers using a range of tactics to try to trick people into giving away sensitive information. One of the most common tactics is to send emails from nearly identical email addresses or domains,...
Spam Filter Improved – “Pest Control Honeypot”
Pest Control HoneypotThis is a new service we have been working on whereby email addresses and URLs (that are witnessed to be in use by spammers) are being blocked by our team for all customer accounts in 'global' fashion.We are already seeing customers begin to...
Maximizing Use of Blocking Functions in Email and Phone Systems
v1 – 8/19/21 - support@avaren.com Summary Background How spam filtering typically works A Note on Phishing Emails Unsubscribing Microsoft Teams Identifying Your Spam Filter Provider Blocking Mail in a Spam Filter Proactive Whitelisting Policy Based...
Another Fake Invoice Racket?
I observed a style of unsolicited "look-a-like" invoice today that I had not seen before. This company attempts to spook those who have registered a new business entity (with the state) into purchasing labor law related compliance materials. There is an element of...
Alert – Computer Related Supply Chain Issues
Manufacturers have been sending out emails warning us to advise clients to plan their PC and laptop purchases in advance.Few models of PCs and laptops are available currently, and those that are available are priced higher than normal. Shipping delays are also...
How-to Auto-Dial Extension Numbers from Smart Phone Contacts
Tired of having to remember and manually enter extension numbers when dialing from your smart phone? It is possible now to have your cell phone automatically dial extension numbers for you. Follow the steps below (for your operating system) to modify your contacts to...
Convenient Security Awareness Training for Business Computer Users
“An awareness and training program is crucial in that it is the vehicle for disseminating information that users, including managers, need in order to do their jobs. In the case of an IT security program, it is the vehicle to be used to communicate security...
Ransomware Attacks Grow More Targeted & Dangerous
ARTICLE BY CALYPTIX SECURITYRansomware attacks used to have a broad scale. Think of the massive WannaCry attack that infected 200,000 machines in 150 countries over a handful of days in 2017. Today, ransomware is much more targeted – and losses from the...
Considerations When Buying a Business Laptop
When buying a new laptop or tablet for a specific business use case; there are a few questions that should be asked of an end-user before a machine is purchased. The first question or consideration is what we would call "machine class". As laptops are made in a...