Users of Windows 11 or Windows Server 2022 with recent CPUs are at risk for data loss. Luckily, few users will be affected. The people who do need to worry are the ones who encrypt data regularly. To be at risk, users needed to have had one of the following hardware...
SpireTech Company News and Tips
Security
End-of-life for Sophos XG Firewall
If you depend on Sophos for your firewall, beware of the end-of-life date on August 17, 2022. On that day, Sophos firewall series XG 85, XG 105 and Sophos Firewall OS v17.5 reaches its end-of-life and will stop receiving security updates. If you are using these models...
Do Not Open: Phish Inside
There’s been a large increase in SMS-phishing (or short message service) in the past few years. If you receive a suspicious text, especially one with a link, do not open it. If you do get hacked, report it to your local law enforcement and inform your wireless...
Windows Server 2012 ends its ten-year reign
Windows Server 2012 and Windows Server 2012 R2 will soon be ending its ten years of service. Its End-of-Life date is October 10, 2023. Why does this matter now? If you use Windows Server for your business, upgrading to a newer version of Windows Server, like Windows...
Be careful what apps you install on your android phone
Researchers have discovered more malicious apps on the Google Play Store, including some that are designed to steal users' personal information. The researchers advise users to be cautious when downloading apps from the Google Play Store, and to only install apps...
New unpatched Microsoft office vulnerability – “Follina”
A new unpatched Microsoft office vulnerability has been discovered by security researchers. The vulnerability, dubbed “Follina”, affects all versions of Microsoft Office from 2007 onwards. Follina tricks the system into downloading malware from a remote URL that is...
Cyber insurance costs on the rise
We’re starting to hear from clients and insurance brokers that cyber insurance costs are on the rise, in some cases up to 200%. Of course, this comes with insurers cracking down on IT controls – making sure their insureds are operating as securely as...
Why “app registrations” present a security risk to M365
Let’s start by describing what an app registration is: An app registration happens when you allow an external program to integrate with your Microsoft 365 tenant. A common example might be allowing a scheduling tool like Calendly to access your companies’...
FBI engages in white-hat hacking
An interesting development came to light recently wherein the FBI intervened on behalf of people who had not updated their watchguard firewalls and had gotten hacked by Russian threat actors. In a clandestine takedown operation cloaked by a federal warrant, FBI...
Client Security Journey
By now we hope that our clients understand that IT security is never “done”. It is a constantly evolving and maturing process involving additional tools, training, and knowledge. This image shows the journey many clients are on with us to improve and mature the...