SpireTech Company News and Tips

Security

Ransomware: 5 Do’s And Don’ts

used with permission from Norton by Symantec By Kevin Haley, Director, Symantec Security Response I despise all forms of bullying. Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you, and refuses to give it back. It's...

read more

What Is Spear Phishing?

used with permission from Norton by Symantecby Nadia Kovacs Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for...

read more

Use Location Services More Safely

used with permission from Microsoft Safety & Security Center Does your phone know where you are? If you've used your phone to find directions or locate a nearby restaurant, you've used its global positioning system (GPS) and it's likely that it would be...

read more

The Network is the Security Device

Used with the permission of http://thenetwork.cisco.com by Marc Solomon, Vice President of Security Marketing As connectivity continues to expand, security must advance right along with it. More than thirty years ago, John Gage of Sun Microsystems coined the now...

read more

How to Detect Malware Symptoms

used with permission from Microsoft Safety & Security Center If your computer starts to behave strangely, you might be experiencing spyware symptoms or have other unwanted software installed on your computer. Here are a few tips on how to detect malicious...

read more

Advantages of Managed IT Services

Many small to mid-sized organizations are turning to Managed Service Providers (MSPs) to help alleviate some of the strain on their internal IT resources, or take over the management of their network all together. There are quite a few benefits to partnering with an...

read more

Security Update on POODLE Vulnerability

A couple of days ago a new vulnerability was uncovered called “POODLE”. This vulnerability potentially places all web servers at risk that allow lower forms of encryption (SSL version 3). If exploited, data that should be secure could be compromised. There are a...

read more

7 Steps for Safer Surfing

used with permission from HP Technology at Work You might not think about it when you’re browsing the web, shopping online and interacting on social media, but you are the first line of defense against cyber security risks. The power to be safe is in your hands, and...

read more

Archives

Categories