Running a business requires a lot of responsibility and awareness. In the cyber world, there are many dangers lurking and waiting for the opportunity to attack unsuspecting victims. Here at SpireTech, we believe educating businesses on how to protect themselves is...
SpireTech Company News and Tips
Phishing
QR Codes are being used in Phishing Attacks
QR codes are being used to deliver phishing links. In a phishing campaign estimated to have launched in May 2023, threat actors utilize QR codes to redirect users to a harmful location. This campaign targets someone’s Microsoft credentials and asks them to...
How scammers took over Google Ads with malvertising
The shiny new phishing tactic on the block is malvertising, or the efforts of threat actors to mimic a legitimate company’s website, landing pages, URL, and more. Google Ads has recently come under fire for their handling of final destination URLs, and the relative...
More spam/phish than ever
Our service desk always gets a lot of questions about whether or not an email is legitimate. If you suspect an email is not legitimate, it probably is not – usually your gut instinct is correct here. 95% of the...
How to report spam to Microsoft 365
Getting a lot of annoying spam in your email? Here's a quick guide on how to report spam in Microsoft 365. For customers using Office 365’s built-in junk mail filter, there is an outlook plugin you can install to report spam that gets past Microsoft’s filters and move...
How to detect phishing and scam emails
At SpireTech, our managed services clients often contact the helpdesk to determine if an email is fake or not. We thought it’d be helpful to put together a short instructional video to help you identify some common signs that an email is a phish or fake email....
Netflix phishing scam: Don’t take the bait
used with permission from FTC.gov., by Colleen Tressler Phishing is when someone uses fake emails or texts to get you to share valuable personal information – like account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information...
Check email header information for signs of spoofing
Think about this scenario: A friend tells you that they received a message from your email address that wasn’t really sent from you. They think you’ve been hacked and your account is sending malicious emails to friends. How do you know if your email address...
Fend off cybercriminals with better business security practices
used with permission from Tektonika (HP), by Karen Gilleland “Gimme the dough—or you’ll never see your files again!” In this scenario, the thug in the mask is ransomware, and it’s only one of the ways cybercriminals attack businesses—which are often left vulnerable...
How to avoid a Bitcoin blackmail scam
used with permission from FTC.gov., by Cristina Miranda “I know about the secret you are keeping from your wife and everyone else. You can ignore this letter, or pay me a $8600 confidentiality fee in Bitcoin”. It’s enough to send shivers down anyone’s spine, but these...