used with permission from HP Technology at Work More than half of small and midsize businesses in the U.S. have suffered a cyber attack in the past year—but despite this frightening reality, very few businesses are making IT security a priority this year. That's a big...
SpireTech Company News and Tips
Security
CloudBleed and You
You may have heard about a recent vulnerability that has affected Cloudflare, and therefore certain sites that use cloudflare services. Cloudflare is a "Content Delivery Network" or CDN, and is used to speed up websites by acting as a "cache" that sits between...
Increased Security Concerns For Remote Desktop
At SpireTech, we've noticed an increase in certain types of "Brute Force" attacks on Microsoft Windows operating systems, particularly those allowing Remote Desktop. A 'brute force' attack is a repeated automated attempt to gain unauthorized access by...
Data Breaches That Made Headlines in 2016
used with permission from Norton by Symantec, by Christina Schubert 980 data breaches occurred in 2016. That left an approximate 35,233,317 known records exposed. Over the years, data breaches have become more sophisticated, and cybercriminals target both...
Protect or pay: 10 tips for safer online shopping this holiday
used with the permission of http://thenetwork.cisco.com, by Blake Snow What's a consumer to do in the age of online holiday shopping? Where there's money there are thieves nearby. That's the biggest risk facing online shoppers today, whether through phishing, stolen...
From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in the Workplace
used with permission from Norton by Symantec, by Nadia Kovacs Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits… all...
10 Ways to Keep Your Mobile Devices (and the Data on Them) More Secure
used with permission from SBA.gov, by Anita Campbell Mobile devices pose heightened security risks. Those risks come in several forms. Devices -- including business data saved on them such as call records, contacts, images, videos, documents and email messages -- can...
Keep Your Home Wi-Fi Safe in 7 Simple Steps
used with permission from Norton by Symantec, by Christina Schubert It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads...
5 Red Flags of Identity Theft
used with permission from Norton by Symantec, by Christina Schubert An estimated 11.7 million people are victims of identity theft each year. It is a growing crime and it is expected to grow more with each passing year. There is a big demand for stolen identities...
Who’s the weakest link?
used with permission from HP Technology at Work Even if your business is using updated software, firewalls, and antivirus protection, your employees could create a cybersecurity risk. Common errors that employees at all levels make when using technology may prove...