used with permission from Norton by Symantec, by Nadia Kovacs Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits… all...
SpireTech Company News and Tips
Security
10 Ways to Keep Your Mobile Devices (and the Data on Them) More Secure
used with permission from SBA.gov, by Anita Campbell Mobile devices pose heightened security risks. Those risks come in several forms. Devices -- including business data saved on them such as call records, contacts, images, videos, documents and email messages -- can...
Keep Your Home Wi-Fi Safe in 7 Simple Steps
used with permission from Norton by Symantec, by Christina Schubert It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads...
5 Red Flags of Identity Theft
used with permission from Norton by Symantec, by Christina Schubert An estimated 11.7 million people are victims of identity theft each year. It is a growing crime and it is expected to grow more with each passing year. There is a big demand for stolen identities...
Who’s the weakest link?
used with permission from HP Technology at Work Even if your business is using updated software, firewalls, and antivirus protection, your employees could create a cybersecurity risk. Common errors that employees at all levels make when using technology may prove...
Rise in Ransomware Attacks
There has been a significant increase in activity by a malicious ransomware software called Troldesh. We have recognized that systems that are not actively managed or have no system access management policies are exceptionally susceptible to the current version of...
How a Gmail Password Stealing Scam Works
used with permission from Norton by Symantec Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you need to know to...
Time to Change Your LinkedIn Passwords! 117 Million Credentials Have Been Breached.
used with permission from Norton by Symantec, by Nadia Kovacs In 2012, LinkedIn suffered a data breach of six million user account names and passwords. Apparently, that breach is extremely larger than originally reported. A Russian hacker going by the name of “Peace”...
Critical Vulnerabilities Affecting QuickTime for Windows
used with permission from Norton by Symantec, by Christina Schubert Two zero-day vulnerabilities showed up recently that could spell trouble for those who use QuickTime for Windows. The ZDI-16-241 and ZDI-16-242 vulnerabilities allow an attacker to run malware or...
What is Grayware, Adware, and Madware?
used with permission from Norton by Symantec, by Nadia Kovacs If you're like most Internet users, you've never even heard of grayware, adware or madware. That's because these are all lower on the threat scale in the world of malicious programming. What's more, they...