SpireTech Company News and Tips

Phishing

Google Docs phishing attack

As some of you may already be aware of, there has been a large scale email phishing attack that impersonates a Google Docs request. Although it may appear that the email requests are coming from a known sender or domain, they are using techniques to spoof those...

read more

6 steps to securing your email

used with permission from HP Technology at Work Is your company's email providing a tempting route for cyber criminals to attack your business? Hackers continue to target businesses with phishing attacks. Once opened, these malicious email messages can hijack an...

read more

Cyber Security Best Practices for Employees

used with permission from Norton by Symantec, by Nadia Kovacs Employees are on the front lines of information security. The more that can be done to regularly educate yourself of the small things you can do can go a long way towards protecting your organization. Since...

read more

What Is Spear Phishing?

used with permission from Norton by Symantecby Nadia Kovacs Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for...

read more

Do not Fall Prey to Internet Phishing Scams

Phishing scams are at the top of cyber criminals’ moneymaking lists. It’s disturbing that the important data of organizations such as Sony are under threat from phishing scams. But in contrast to the widespread notion, these scams affect small enterprise owners as...

read more

Archives

Categories