View by category: News | How To | Security | Updates

MYTH: Solving technical problems is complicated. We have all been conditioned to believe this is true. We call a help line and it takes an army to solve the problem. The first person we talk to cannot solve our problem, so we’re routed to a technician who attempts to solve the problem. If the technician cannot solve the problem, we’re routed Read More
 
Fact or fiction? Apple computers don’t get viruses and are more secure than Windows computers. Does this sound familiar? Maybe this has led you to purchase a Mac and be among those illuminating our nation’s coffee shops with the warm glow of an Apple logo. As to the above question, this is fiction. Though the familiar logo may resemble a Read More
 ,
Did you let your favorite nephew Timmy use your computer during Thanksgiving to keep him busy and out of the way while you fried a turkey? That makes you an awesome uncle, but now that the family has left and you’re trying to do some Cyber Monday shopping, you notice Timmy has left your computer in an unrecognizable state. What Read More
 
Our favorite web services ask a lot of us these days, and it’s easy to lose track of what information we have allowed to be collected over time. Primarily due to their relationships with advertisers, Facebook and Google are the most likely candidates to know a lot about your demographics and interests. EVAN recommends the following two articles from CNBC Read More
 ,
In 2017, 30% of the world’s population uses a smartphone. The rapid growth of devices that are always near us and always connected to the internet makes them prime targets for theft and hacking. For convenience’s sake, we often don’t protect them as well as we should. Security software company, Trend Micro, offers valuable insight to this topic on their Read More
 ,
The year 2017 will likely conclude with a record for the number of large scale, damaging data breaches in history. From Equifax to Verizon to Yahoo, it’s clear that data and information security should be a top priority in 2018. As a small business owner or home computer user, the scale of attacks you might face are much smaller than Read More
 ,

Receive weekly EVAN blog updates!

* indicates required