used with permission from Norton by Symantec By Kevin Haley, Director, Symantec Security Response I despise all forms of bullying. Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you, and refuses to give it back. It's...
SpireTech Company News and Tips
Security
What Is Spear Phishing?
used with permission from Norton by Symantecby Nadia Kovacs Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for...
Government warns IT professionals about Cybercrime
We've had the privilege over the last couple of months to attend a couple of IT and tech industry conferences. The NSA, FBI, and Homeland Security had speakers at these conferences and they are sending a message: US Businesses are the target of...
The best way to prepare for disasters and security breaches
used with permission from HP Technology at Work What would happen if your company lost your critical business data? Whether your application is email, your website, accounts receivable or any other critical application, your IT infrastructure is...
Use Location Services More Safely
used with permission from Microsoft Safety & Security Center Does your phone know where you are? If you've used your phone to find directions or locate a nearby restaurant, you've used its global positioning system (GPS) and it's likely that it would be...
The Network is the Security Device
Used with the permission of http://thenetwork.cisco.com by Marc Solomon, Vice President of Security Marketing As connectivity continues to expand, security must advance right along with it. More than thirty years ago, John Gage of Sun Microsystems coined the now...
How to Detect Malware Symptoms
used with permission from Microsoft Safety & Security Center If your computer starts to behave strangely, you might be experiencing spyware symptoms or have other unwanted software installed on your computer. Here are a few tips on how to detect malicious...
Advantages of Managed IT Services
Many small to mid-sized organizations are turning to Managed Service Providers (MSPs) to help alleviate some of the strain on their internal IT resources, or take over the management of their network all together. There are quite a few benefits to partnering with an...
Security Update on POODLE Vulnerability
A couple of days ago a new vulnerability was uncovered called “POODLE”. This vulnerability potentially places all web servers at risk that allow lower forms of encryption (SSL version 3). If exploited, data that should be secure could be compromised. There are a...
7 Steps for Safer Surfing
used with permission from HP Technology at Work You might not think about it when you’re browsing the web, shopping online and interacting on social media, but you are the first line of defense against cyber security risks. The power to be safe is in your hands, and...