SpireTech has been monitoring developments relative to security questions being raised about Kaspersky Anti-Virus software, including the US federal government’s restrictions for federal agencies announced on September 13, 2017. SpireTech is currently...
SpireTech Company News and Tips
Security
7 tips to prevent ransomware
used with permission from Norton by Symantec Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted...
Why bother with updates and upgrades?
When was the last time you thought about software updates and hardware upgraes? For many, updating software and hardware is not a priority because “If it ain’t broke, don’t fix it”. However, it’s clear that today’s cyber attacks prey on vulnerabilities present in old...
Start with security – and stick with it
used with permission from SBA.gov, by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection When it comes to data security, what’s reasonable will depend on the size and nature of your business and the kind of data you deal with. But certain principles...
What does your business stand to lose in a cyber attack?
used with permission from Microsoft US Small and Midsize Business Blog Not long ago, I blogged here about a new type of cybercrime called ransomware. But when it comes to cyber crooks, apparently they’re also using some old-fashioned methods to breach businesses’...
Lead generation: When the “product” is personal data
used with permission from FTC.gov., Lesley Fair There's been a lot of talk about "ping trees" and other activities associated with the lead generation industry. The FTC's concern is that consumers don't get ponged in the process. A proposed settlement gives a glimpse...
Google Docs phishing attack
As some of you may already be aware of, there has been a large scale email phishing attack that impersonates a Google Docs request. Although it may appear that the email requests are coming from a known sender or domain, they are using techniques to spoof those...
Warning: New Petya ransomware outbreak similar to WannaCry is spreading worldwide
A new ransomware attack called Petya, PetyaWrap, or GoldenEye began spreading worldwide on June 27th, and it looks similar to the WannaCry outbreak in May. It targets Microsoft Windows operating systems and so far reports show that all systems from XP to Windows 10...
6 steps to securing your email
used with permission from HP Technology at Work Is your company's email providing a tempting route for cyber criminals to attack your business? Hackers continue to target businesses with phishing attacks. Once opened, these malicious email messages can hijack an...
Scammers are not “friends” to small business owners
used with permission from the FTC, by Rosario Méndez Scammers try to contact people in many ways. They call, email, put ads online, send messages on social media and more. If you own a small business, they’re trying to contact you, too. Lately we’ve been hearing about...