used with permission from Norton by Symantec by Nadia Kovacs Ransomware is a form of malware that will lock files on a computer using encryption. Encryption converts files into another format, like a secret code and can only be decoded by a specific decryption key....
SpireTech Company News and Tips
Security
Use Location Services More Safely
used with permission from Microsoft Safety & Security Center Does your phone know where you are? If you've used your phone to find directions or locate a nearby restaurant, you've used its global positioning system (GPS) and it's likely that it would be...
Password Managers Are The Key To Secure Passwords
used with permission from Norton by Symantecby Nadia Kovacs According to the credit reporting firm Experian, the average Internet user has about 19 different online accounts, for which they only have seven different passwords. In addition, one in ten users...
Avoid Hackers, Spammers, and Identify Thieves With 5 Simple Tips
used with permission from Microsoft at Work Whether at work, home, or mobile, keeping your computer and other devices secure is important. There are any number of threats to security on the web, but keeping your personal and work data safe is relatively easy. It may...
Malware 101: What Is Malware?
used with permission from Norton by Symantecby Nadia Kovacs Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal...
The Importance of Two-Factor Authentication
used with permission from Norton by SymantecNadia Kovacs The significance of employing secure passwords is more important than ever. Hackers are hungry for passwords, as they have substantial monetary value. Stories are constantly developing in the media about high...
How to Detect Malware Symptoms
used with permission from Microsoft Safety & Security Center If your computer starts to behave strangely, you might be experiencing spyware symptoms or have other unwanted software installed on your computer. Here are a few tips on how to detect malicious...
7 Steps for Safer Surfing
used with permission from HP Technology at Work You might not think about it when you’re browsing the web, shopping online and interacting on social media, but you are the first line of defense against cyber security risks. The power to be safe is in your hands, and...
Linux Shellshock bug being actively exploited in the wild
Last week, the Linux community was "shocked" to learn about Shellshock, a long-term bug that exists in bash, the command line environment on most Linux servers. The bug is being exploited in the wild to spread via a botnet, which automatically spreads itself to...
Patch Right and Keep Hackers Out
used with permission from HP Technology at Work In the arms race between network administrators and hackers, battles are fought over the security holes in enterprise software. Your best defence is the patches that vendors release to plug those holes. Vendors are...