used with permission from Norton by Symantec, by Nadia Kovacs Numerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act arguably being the foundation for it all. The Privacy Act passed to establish control...
SpireTech Company News and Tips
Security
Biometrics: How Do They Work? Are They Safe?
used with permission from Norton by Symantec, by Nadia Kovacs Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you login...
How to Keep Your Personal Information Safe on Social Media
used with permission from Norton by Symantec, by Nadia Kovacs Social media runs a significant portion of people's social lives. We use it to connect with far-flung friends and family, send quick messages to co-workers, and announce major (and minor) events in our...
Cyber Security Best Practices for Employees
used with permission from Norton by Symantec, by Nadia Kovacs Employees are on the front lines of information security. The more that can be done to regularly educate yourself of the small things you can do can go a long way towards protecting your organization. Since...
Safe Online Shopping For The Holiday Season
used with permission from Norton by Symantec, by Nadia Kovacs The holidays are just around the corner, and that means many of us will be making purchases online to avoid large crowds and busy mall traffic, especially during Black Friday and Cyber Monday. Sometimes it...
Ransomware: 5 Do’s And Don’ts
used with permission from Norton by Symantec By Kevin Haley, Director, Symantec Security Response I despise all forms of bullying. Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you, and refuses to give it back. It's...
What Is Spear Phishing?
used with permission from Norton by Symantecby Nadia Kovacs Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for...
Government warns IT professionals about Cybercrime
We've had the privilege over the last couple of months to attend a couple of IT and tech industry conferences. The NSA, FBI, and Homeland Security had speakers at these conferences and they are sending a message: US Businesses are the target of...
The best way to prepare for disasters and security breaches
used with permission from HP Technology at Work What would happen if your company lost your critical business data? Whether your application is email, your website, accounts receivable or any other critical application, your IT infrastructure is...
A word about passwords
used with permission from FTC Business Center Blog by Lesley Fair On the old game show "Password," the host whispered a word to contestants, who then gave clues to celebrities. The first to guess correctly advanced to the Lighting Round. The loser went home with a...