Let’s encrypt, an industry nonprofit that issues free SSL certificates, had to revoke 3M certificates Wednesday March 4, 2020 due to a bug. SSL is the technology that gives websites the https “padlock” and is often used to secure other things like mail servers....
SpireTech Company News and Tips
Security
Implement Multi-factor authentication now
We’ve been recommending for quite a while that our clients implement multi-factor authentication (MFA) on their email and Office365 accounts – really, anything that can have MFA enabled should. You may have heard of two-factor authentication (2FA) before,...
How to detect phishing and scam emails
At SpireTech, our managed services clients often contact the helpdesk to determine if an email is fake or not. We thought it’d be helpful to put together a short instructional video to help you identify some common signs that an email is a phish or fake email....
5 reasons why general software updates and patches are important
used with permission from Norton by Symantec, by Steve Symanovich You’re probably no stranger to those little pop-up windows. They tell you software updates are available for your computer, laptop, tablet, or mobile device. You might be tempted to click on that...
Netflix phishing scam: Don’t take the bait
used with permission from FTC.gov., by Colleen Tressler Phishing is when someone uses fake emails or texts to get you to share valuable personal information – like account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information...
Check email header information for signs of spoofing
Think about this scenario: A friend tells you that they received a message from your email address that wasn’t really sent from you. They think you’ve been hacked and your account is sending malicious emails to friends. How do you know if your email address...
Cybersecurity for small business: Ransomware
used with permission from FTC.gov., by Andrew Smith, Director, FTC Bureau of Consumer Protection Mention the word “ransomware” at a meeting of small business owners and you’ll feel the temperature in the room drop by 20 degrees. A ransomware attack is a chilling...
Online scammers cost time and money. Here’s how to fight back.
used with permission from Microsoft On the Issues, by Athima Chansanchai A message pops up on your screen. It screams that your computer is at risk or has been infected by a virus. Or, you receive a phone call from someone claiming to be from tech support. And then,...
Fend off cybercriminals with better business security practices
used with permission from Tektonika (HP), by Karen Gilleland “Gimme the dough—or you’ll never see your files again!” In this scenario, the thug in the mask is ransomware, and it’s only one of the ways cybercriminals attack businesses—which are often left vulnerable...
Warn your friends about tech support scams
used with permission from FTC.gov., by Amy Hebert Tech support scams, which get people to pay for fake computer help or steal their personal information, are convincing. You might already know the signs of a tech support scam, but do your friends and family? Here’s...