Used with the permission of http://thenetwork.cisco.com by Marc Solomon, Vice President of Security Marketing As connectivity continues to expand, security must advance right along with it. More than thirty years ago, John Gage of Sun Microsystems coined the now...
SpireTech Company News and Tips
Security
How to Detect Malware Symptoms
used with permission from Microsoft Safety & Security Center If your computer starts to behave strangely, you might be experiencing spyware symptoms or have other unwanted software installed on your computer. Here are a few tips on how to detect malicious...
Advantages of Managed IT Services
Many small to mid-sized organizations are turning to Managed Service Providers (MSPs) to help alleviate some of the strain on their internal IT resources, or take over the management of their network all together. There are quite a few benefits to partnering with an...
Security Update on POODLE Vulnerability
A couple of days ago a new vulnerability was uncovered called “POODLE”. This vulnerability potentially places all web servers at risk that allow lower forms of encryption (SSL version 3). If exploited, data that should be secure could be compromised. There are a...
7 Steps for Safer Surfing
used with permission from HP Technology at Work You might not think about it when you’re browsing the web, shopping online and interacting on social media, but you are the first line of defense against cyber security risks. The power to be safe is in your hands, and...
Linux Shellshock bug being actively exploited in the wild
Last week, the Linux community was "shocked" to learn about Shellshock, a long-term bug that exists in bash, the command line environment on most Linux servers. The bug is being exploited in the wild to spread via a botnet, which automatically spreads itself to...
Patch Right and Keep Hackers Out
used with permission from HP Technology at Work In the arms race between network administrators and hackers, battles are fought over the security holes in enterprise software. Your best defence is the patches that vendors release to plug those holes. Vendors are...
The dark side of Internet search
The Internet search engine Shodan has made a splash by getting a spotlight on multiple blogs and sites like CNN this month. There is a lot of sniffing and crawling that happens on the internet; Shodan's niche is the darker side of the internet - sites that aren't...
Securing your WordPress site against hacks
Ensuring that your website is protected against hackers is no longer a difficult task. With the fast growth of WordPress sites, protecting yourself from outside intrusion is very important, and is as simple as clicking the update button. WordPress is frequently...
Java vulnerabilities and patches continue
We continue to note that Java vulnerabilities and patches continue to be discovered and issued at an alarming rate. Note that Java is different from Javascript. Javascript is very common and runs in your browser and is not subject to these...