<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=445056146107513&amp;ev=PageView&amp;noscript=1">

Hagerman Blog

John Boline

Service Manager MCSE, CNE, USE, Hagerman & Company, Inc.

Recent Posts

PUPS: Cute to watch, unless they are on your computer

Posted by John Boline on Jul 25, 2019 3:02:00 PM

There is nothing quite as cute as a puppy. They are full of energy and wonder; they bring a smile to your face, right? Well yes, a real pup will do that, but not on your computer. On your computer, a PUP is a potentially unwanted program. Watch to see what we mean and what you can do about it.

Read More

Topics: Technical Perspective

Phishing Attacks: More Flavors, More Sophisticated

Posted by John Boline on Feb 21, 2019 2:18:12 PM

Phishing attacks have been around since the mid 1990’s. Phishing is when someone uses electronic communication to get you to divulge sensitive or financial information. The three common types of attack are Phishing, Spear-Phishing and the latest, Laser-Phishing. We will discuss all of these here in this presentation.

Read More

Topics: Technical Perspective

Drive-By or Unwanted Software: How to Avoid Those Unwanted Downloads

Posted by John Boline on Oct 31, 2018 1:24:21 PM

You look at your machine and see programs you did not load. How did they get there? Unwanted software was ‘Drive-By’ downloaded without your knowledge or added when you downloaded something you wanted as you ‘clicked next’ to install the software. How do you deal with this? Watch this vlog to see how it happens and what you can do to protect yourself and your machine.

 
Read More

Topics: Technical Perspective