used with permission from FTC.gov., by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection Who’s coming in and what’s going out? Businesses that want to stick with security build commonsense monitoring into their brick-and-mortar operations. Whether...
SpireTech Company News and Tips
Security
SpireTech expands Sophos partnership
As you may be aware, the software company Kaspersky has recently been a heated topic of discussion in the media and amongst the IT security community. Last month U.S. government agencies were told to use other security solutions. SpireTech, as are most IT...
A Short Guide to Data Security Practices for Your Business
Much has been said about data security practices and cybersecurity measures that businesses should follow. All the information and recommendations out there can be confusing and overwhelming. Large data breaches and multiple scary ransomware attacks have dominated the...
Kaspersky AntiVirus Notice
SpireTech has been monitoring developments relative to security questions being raised about Kaspersky Anti-Virus software, including the US federal government’s restrictions for federal agencies announced on September 13, 2017. SpireTech is currently...
7 tips to prevent ransomware
used with permission from Norton by Symantec Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted...
Start with security – and stick with it
used with permission from SBA.gov, by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection When it comes to data security, what’s reasonable will depend on the size and nature of your business and the kind of data you deal with. But certain principles...
What does your business stand to lose in a cyber attack?
used with permission from Microsoft US Small and Midsize Business Blog Not long ago, I blogged here about a new type of cybercrime called ransomware. But when it comes to cyber crooks, apparently they’re also using some old-fashioned methods to breach businesses’...
6 steps to securing your email
used with permission from HP Technology at Work Is your company's email providing a tempting route for cyber criminals to attack your business? Hackers continue to target businesses with phishing attacks. Once opened, these malicious email messages can hijack an...
Why you need to get serious about cybersecurity
used with permission from HP Technology at Work More than half of small and midsize businesses in the U.S. have suffered a cyber attack in the past year—but despite this frightening reality, very few businesses are making IT security a priority this year. That's a big...
Increased Security Concerns For Remote Desktop
At SpireTech, we've noticed an increase in certain types of "Brute Force" attacks on Microsoft Windows operating systems, particularly those allowing Remote Desktop. A 'brute force' attack is a repeated automated attempt to gain unauthorized access by...