used with permission from SBA.gov, by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection When it comes to data security, what’s reasonable will depend on the size and nature of your business and the kind of data you deal with. But certain principles...
SpireTech Company News and Tips
Security
What does your business stand to lose in a cyber attack?
used with permission from Microsoft US Small and Midsize Business Blog Not long ago, I blogged here about a new type of cybercrime called ransomware. But when it comes to cyber crooks, apparently they’re also using some old-fashioned methods to breach businesses’...
6 steps to securing your email
used with permission from HP Technology at Work Is your company's email providing a tempting route for cyber criminals to attack your business? Hackers continue to target businesses with phishing attacks. Once opened, these malicious email messages can hijack an...
Why you need to get serious about cybersecurity
used with permission from HP Technology at Work More than half of small and midsize businesses in the U.S. have suffered a cyber attack in the past year—but despite this frightening reality, very few businesses are making IT security a priority this year. That's a big...
Increased Security Concerns For Remote Desktop
At SpireTech, we've noticed an increase in certain types of "Brute Force" attacks on Microsoft Windows operating systems, particularly those allowing Remote Desktop. A 'brute force' attack is a repeated automated attempt to gain unauthorized access by...
Protect or pay: 10 tips for safer online shopping this holiday
used with the permission of http://thenetwork.cisco.com, by Blake Snow What's a consumer to do in the age of online holiday shopping? Where there's money there are thieves nearby. That's the biggest risk facing online shoppers today, whether through phishing, stolen...
From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in the Workplace
used with permission from Norton by Symantec, by Nadia Kovacs Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits… all...
10 Ways to Keep Your Mobile Devices (and the Data on Them) More Secure
used with permission from SBA.gov, by Anita Campbell Mobile devices pose heightened security risks. Those risks come in several forms. Devices -- including business data saved on them such as call records, contacts, images, videos, documents and email messages -- can...
5 Red Flags of Identity Theft
used with permission from Norton by Symantec, by Christina Schubert An estimated 11.7 million people are victims of identity theft each year. It is a growing crime and it is expected to grow more with each passing year. There is a big demand for stolen identities...
Who’s the weakest link?
used with permission from HP Technology at Work Even if your business is using updated software, firewalls, and antivirus protection, your employees could create a cybersecurity risk. Common errors that employees at all levels make when using technology may prove...