used with permission from Tektonika (HP), by Karen Gilleland Unlike fine wine, your cyber assets don’t get better with age. Any PC more than four years old is not only costly to keep, but it’s also hack-friendly tech that could pose serious office security risk. Old...
SpireTech Company News and Tips
Security
How to avoid a Bitcoin blackmail scam
used with permission from FTC.gov., by Cristina Miranda “I know about the secret you are keeping from your wife and everyone else. You can ignore this letter, or pay me a $8600 confidentiality fee in Bitcoin”. It’s enough to send shivers down anyone’s spine, but these...
Watch out for card skimming at the gas pump
used with permission from FTC.gov, by Colleen Tressler With the summer travel season in high gear, the FTC is warning drivers about skimming scams at the pump. Skimmers are illegal card readers attached to payment terminals. These card readers grab data off a credit...
What are cookies?
used with permission from Norton by Symantec Mention “cookies” and most people expect a chocolate chip treat to appear. When talking about computers, however, cookies aren’t on the dropdown menu. In fact, they’re not even physical objects. Yet they do a great deal of...
Tackle internet safety today – it might be easier than you think
used with permission from Tektonika (HP) Information security breaches are becoming so commonplace, they’re seen as the cost of doing business—but they don’t have to be. Promoting internet safety and device security isn’t as hard as it might seem. By making small...
Safety-First Cyber Security Summer
Summer vacations and conferences often involve travel, and when you’re traveling it is best to keep in mind the additional risks and challenges for keeping data safe. Security essentials for your travels should include methods of protecting data online – think of it...
The effects of VPNFilter on SpireTech customers
At the end of May the Cisco Talos security team released information on a new attack on consumer network infrastructure. The attack affects dozens of models of routers commonly used in home and small business networks. It is estimated that over 500,000 devices have...
5 mobile threats you should shut down in 2018
used with permission from Tektonika (HP) Mobile devices are now a staple of the workplace, as ubiquitous as open floor plans and videoconferencing. Enabling employees to work from their mobile devices can even boost satisfaction, productivity, creativity, loyalty, and...
Cryptojacking: What it is and how to prevent it
used with the permission of http://thenetwork.cisco.com, by Stephanie Chan Google announced Monday a ban on all Chrome extensions in the Chrome Web Store used to cryptojack computers. This newer form of hacking uses these extensions to get into a victim's computer and...
Are passwords passé?
used with permission from HP Tech@Work Is my password still enough, or do I need more? Without question, security is critical these days. Whether it’s device, online, or mobile security, the need for protection is obvious, and the risk can’t be ignored. For years,...