used with permission from FTC.gov., by Colleen Tressler Phishing is when someone uses fake emails or texts to get you to share valuable personal information – like account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information...
SpireTech Company News and Tips
Check email header information for signs of spoofing
Think about this scenario: A friend tells you that they received a message from your email address that wasn’t really sent from you. They think you’ve been hacked and your account is sending malicious emails to friends. How do you know if your email address...
How to avoid a Bitcoin blackmail scam
used with permission from FTC.gov., by Cristina Miranda “I know about the secret you are keeping from your wife and everyone else. You can ignore this letter, or pay me a $8600 confidentiality fee in Bitcoin”. It’s enough to send shivers down anyone’s spine, but these...
Tackle internet safety today – it might be easier than you think
used with permission from Tektonika (HP) Information security breaches are becoming so commonplace, they’re seen as the cost of doing business—but they don’t have to be. Promoting internet safety and device security isn’t as hard as it might seem. By making small...
6 steps to securing your email
used with permission from HP Technology at Work Is your company's email providing a tempting route for cyber criminals to attack your business? Hackers continue to target businesses with phishing attacks. Once opened, these malicious email messages can hijack an...
How to Turn Off Clutter in Outlook / Office 365
Clutter is a mailbox management feature of Office 365 for Business. (If you don’t have an Office 365 for Business subscription, you will not have this feature.) It analyzes how you process your email and then moves “unimportant” or low-priority email from your Inbox...
Sneaky Spammer Tactics and How To Avoid Them
used with permission from Norton by Symantec, by Nadia Kovacs Spam is a problem on the Internet, coming at us from just about every angle of the online space. Some spammers develop sophisticated, well-planned strategies, while others can be sloppy and still drive...
What Is Spear Phishing?
used with permission from Norton by Symantecby Nadia Kovacs Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for...
Methods for Searching Your Email in Outlook 2013
Do you have thousands of emails stored in your Outlook account? Do you sometimes need to find the one email from five months ago that mentions the access key for a software program you didn't think anyone was still using? We all have times when we need to dig through...
Gmail or Exchange?
used with permission from HP Technology at Work When it comes to business email, change is in the air. Web-based platforms have all but taken over the personal email market—Gmail alone has over 425 million active users worldwide and counting [1]. With Microsoft® also...