At What Point Does a Service Become Spyware?

At What Point Does a Service Become Spyware?

Spyware, like other malware, is a problem for any organization. Since your business generates, collects, and uses considerable amounts of data, there are plenty of organizations that want to get their hands on it. You spend so much time and money protecting your data against threats on the Internet, but what if the spyware were to just come standard on the computer you just bought?


HP, one of the most reliable names in business and consumer hardware, has seemingly been doing exactly that, adding a software, HP Touchpoint Analytics, into their Windows Update. The software, which typically is part of the larger HP Touchpoint Manager, regularly sends a random cache of data from the device. The rationale HP gave for this decision was to relieve “time-consuming tasks of device support and lifecycle management.”

Given that explanation, most wouldn’t bat an eye, but HP does this with data that belongs to users, without the user's consent, and for some, that is a major problem. If you are the skeptical type, and would prefer to not have a program with such liberties working on your organization's computers, consider bringing this up to your IT professional and they can ensure any software that isn’t vital is removed, and working properly.

If you’d like to try your hand at disabling it you need to search Windows Services and disable “HP Touchpoint Analytics Client”, then uninstall it from your installed software list in Windows 10.


If you want to talk about a software strategy that truly suits your business, call White Mountain IT Services today at 603-889-0800.

Related Articles

  • A Brief Overview of Network Security The reliance the modern business has on its IT cannot be understated. As a result, to keep their computing network and infrastructure running efficiently, companies need to have a network and cybersecurity policy in place. With the development and use of organizational computer networks with multipl...
  • Can You Spot the Signs of a Malicious Link? The Internet is notorious for being a minefield of threats, many of which lurk hidden behind innocent-looking links. In order to go about business safely, you need to be able to identify which links you can click; and, which should be skipped. Unfortunately, spotting fraudulent links isn’t an exact...
  • FREE Printout: Dos and Don’ts of IT Security The following guide is designed to be used by business owners and office managers as an educational resource to establish some basic IT security best practices in the workplace. Feel free to print it out and hand it out or post it in common areas. You work on important things. Let’s all work togeth...
  • Is Your Password Security Up to Par? Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be gues...
  • Your Employees Can Be One Of Your Biggest Security Risks A surprising number of security issues come from inside your organization. User error on the part of the employee can present major problems for your workflow, data security, and the integrity of your business. User error could be something as simple as an employee clicking on the wrong links when t...
  • Hackers May Meet Their Match With AI There are many organizations in the world that simply can’t have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics) has far too powerful of a computer grid to allow hackers to access it. ...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions