used with permission from Norton by Symantec By Kevin Haley, Director, Symantec Security Response I despise all forms of bullying. Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you, and refuses to give it back. It's...
SpireTech Company News and Tips
Security
What Is Spear Phishing?
used with permission from Norton by Symantecby Nadia Kovacs Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for...
Government warns IT professionals about Cybercrime
We've had the privilege over the last couple of months to attend a couple of IT and tech industry conferences. The NSA, FBI, and Homeland Security had speakers at these conferences and they are sending a message: US Businesses are the target of...
The best way to prepare for disasters and security breaches
used with permission from HP Technology at Work What would happen if your company lost your critical business data? Whether your application is email, your website, accounts receivable or any other critical application, your IT infrastructure is...
A word about passwords
used with permission from FTC Business Center Blog by Lesley Fair On the old game show "Password," the host whispered a word to contestants, who then gave clues to celebrities. The first to guess correctly advanced to the Lighting Round. The loser went home with a...
Ransomware: When Cybercriminals Hold Your Computer Hostage
used with permission from Norton by Symantec by Nadia Kovacs Ransomware is a form of malware that will lock files on a computer using encryption. Encryption converts files into another format, like a secret code and can only be decoded by a specific decryption key....
Use Location Services More Safely
used with permission from Microsoft Safety & Security Center Does your phone know where you are? If you've used your phone to find directions or locate a nearby restaurant, you've used its global positioning system (GPS) and it's likely that it would be...
Password Managers Are The Key To Secure Passwords
used with permission from Norton by Symantecby Nadia Kovacs According to the credit reporting firm Experian, the average Internet user has about 19 different online accounts, for which they only have seven different passwords. In addition, one in ten users...
Avoid Hackers, Spammers, and Identify Thieves With 5 Simple Tips
used with permission from Microsoft at Work Whether at work, home, or mobile, keeping your computer and other devices secure is important. There are any number of threats to security on the web, but keeping your personal and work data safe is relatively easy. It may...
Malware 101: What Is Malware?
used with permission from Norton by Symantecby Nadia Kovacs Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal...