used with permission from FTC.gov., by John Krebs You’ve heard about the “dark web” and wondered how it affects businesses – including small businesses. That was one of the topics addressed at an FTC conference earlier this year on identity theft. Recent headlines...
SpireTech Company News and Tips
Security
Businesses beware: Researchers spot bug in Wi-Fi network encryption
used with permission from FTC.gov., by Phoebe Rouge You’ve read recent news stories about a vulnerability discovered in the WPA2 encryption standard. (Some reports refer to it as KRACK – Key Reinstallation Attack.) Should this be of concern to your business? Yes. Does...
SpireTech expands Sophos partnership
As you may be aware, the software company Kaspersky has recently been a heated topic of discussion in the media and amongst the IT security community. Last month U.S. government agencies were told to use other security solutions. SpireTech, as are most IT...
Are social logins safe to use?
used with permission from Norton by Symantec By now you’ve noticed you typically have two options to log in to an online account. One is the traditional username and password combination. The other is the social login, which uses your credentials for a social...
A Short Guide to Data Security Practices for Your Business
Much has been said about data security practices and cybersecurity measures that businesses should follow. All the information and recommendations out there can be confusing and overwhelming. Large data breaches and multiple scary ransomware attacks have dominated the...
Kaspersky AntiVirus Notice
SpireTech has been monitoring developments relative to security questions being raised about Kaspersky Anti-Virus software, including the US federal government’s restrictions for federal agencies announced on September 13, 2017. SpireTech is currently...
7 tips to prevent ransomware
used with permission from Norton by Symantec Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted...
Why bother with updates and upgrades?
When was the last time you thought about software updates and hardware upgraes? For many, updating software and hardware is not a priority because “If it ain’t broke, don’t fix it”. However, it’s clear that today’s cyber attacks prey on vulnerabilities present in old...
Start with security – and stick with it
used with permission from SBA.gov, by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection When it comes to data security, what’s reasonable will depend on the size and nature of your business and the kind of data you deal with. But certain principles...
What does your business stand to lose in a cyber attack?
used with permission from Microsoft US Small and Midsize Business Blog Not long ago, I blogged here about a new type of cybercrime called ransomware. But when it comes to cyber crooks, apparently they’re also using some old-fashioned methods to breach businesses’...