used with permission from FTC.gov., by Cristina Miranda “I know about the secret you are keeping from your wife and everyone else. You can ignore this letter, or pay me a $8600 confidentiality fee in Bitcoin”. It’s enough to send shivers down anyone’s spine, but these...
SpireTech Company News and Tips
Tackle internet safety today – it might be easier than you think
used with permission from Tektonika (HP) Information security breaches are becoming so commonplace, they’re seen as the cost of doing business—but they don’t have to be. Promoting internet safety and device security isn’t as hard as it might seem. By making small...
6 steps to securing your email
used with permission from HP Technology at Work Is your company's email providing a tempting route for cyber criminals to attack your business? Hackers continue to target businesses with phishing attacks. Once opened, these malicious email messages can hijack an...
How to Turn Off Clutter in Outlook / Office 365
Clutter is a mailbox management feature of Office 365 for Business. (If you don’t have an Office 365 for Business subscription, you will not have this feature.) It analyzes how you process your email and then moves “unimportant” or low-priority email from your Inbox...
Sneaky Spammer Tactics and How To Avoid Them
used with permission from Norton by Symantec, by Nadia Kovacs Spam is a problem on the Internet, coming at us from just about every angle of the online space. Some spammers develop sophisticated, well-planned strategies, while others can be sloppy and still drive...
What Is Spear Phishing?
used with permission from Norton by Symantecby Nadia Kovacs Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for...
Methods for Searching Your Email in Outlook 2013
Do you have thousands of emails stored in your Outlook account? Do you sometimes need to find the one email from five months ago that mentions the access key for a software program you didn't think anyone was still using? We all have times when we need to dig through...
Gmail or Exchange?
used with permission from HP Technology at Work When it comes to business email, change is in the air. Web-based platforms have all but taken over the personal email market—Gmail alone has over 425 million active users worldwide and counting [1]. With Microsoft® also...
How to detect phishing emails and spam
After some recent discussions with some clients and family, it occurred to me that many people still have questions about how to tell "fake" emails from real ones - so I thought it might be a good time to point out some sure-fire ways to know when to hit that delete...
Do not Fall Prey to Internet Phishing Scams
Phishing scams are at the top of cyber criminals’ moneymaking lists. It’s disturbing that the important data of organizations such as Sony are under threat from phishing scams. But in contrast to the widespread notion, these scams affect small enterprise owners as...