Velocity Technology Partners Blogs

At What Point Does a Service Become Spyware?

At What Point Does a Service Become Spyware?

Spyware, like other malware, is a problem for any organization. Since your business generates, collects, and uses considerable amounts of data, there are plenty of organizations that want to get their hands on it. You spend so much time and money protecting your data against threats on the Internet, but what if the spyware were to just come standard on the computer you just bought?

HP, one of the most reliable names in business and consumer hardware, has seemingly been doing exactly that, adding a software, HP Touchpoint Analytics, into their Windows Update. The software, which typically is part of the larger HP Touchpoint Manager, regularly sends a random cache of data from the device. The rationale HP gave for this decision was to relieve “time-consuming tasks of device support and lifecycle management.”

Given that explanation, most wouldn’t bat an eye, but HP does this with data that belongs to users, without the user's consent, and for some, that is a major problem. If you are the skeptical type, and would prefer to not have a program with such liberties working on your organization's computers, consider bringing this up to your IT professional and they can ensure any software that isn’t vital is removed, and working properly.

If you’d like to try your hand at disabling it you need to search Windows Services and disable “HP Touchpoint Analytics Client”, then uninstall it from your installed software list in Windows 10.

If you want to talk about a software strategy that truly suits your business, call Velocity Technology Partners today at (800) - 983 - 5765.

Redundancy: a Benefit When Dealing in Data
Tip of the Week: Are You at Risk Due to the IoT?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 23 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Privacy Content Filtering Telephone Softphones Operating System Windows Mobility Memory Sales Commerce Data Storage Unsupported Software Sports BDR Lifestyle Cloud Computing Fraud SaaS Audit Remote Monitoring Language History Politics Wi-Fi Big Data Charger Technology Android Outlook Smart Tech Managed Service Provider Regulation Legal Cost Management Computer Forensics Company Culture Connectivity Blockchain Gmail Telephone Systems Gadgets Google Assistant Best Practice Conferencing Gamification Legislation App Google Drive Updates Management Communications Automation Financial Technology Cybersecurity Financial Mobile Security Microsoft Office Data Protection WiFi Two-factor Authentication MSP Tip of the Week Money Office 365 User Tips Phishing Server Data Security Identity Streaming Media Data Hosted Solutions Social Engineering Passwords Managed IT services Data Loss Twitter Vendor Management Software iPhone Disaster Recovery Identity Theft Hardware Cybercrime Saving Money Data Recovery Word Data Backup Education Safety Internet of Things Efficiency eWaste Storage Value IT support Data Theft Security Data Breach IT Support Flexibility Redundancy Cortana Wireless Technology Proactive IT Computing Smartphone Managed IT Services Hosted Solution Proactive Update BYOD Spam Mobile Devices Outsourced IT Software as a Service IT budget HBO Chromebook Small Business Virus Social Media Hybrid Cloud Antivirus Windows Ink Students Retail Identities File Sharing Encryption Congratulations Maintenance Licensing VPN Tablets Hard Drive Windows 10 Google Docs Shortcut Ransomware Screen Mirroring Edge Business Management Content Filter Malware Unified Communications Holiday Communication Bring Your Own Device Best Practices Google Cloud Ciminal Government Comparison Smartphones Data Privacy Computers The Internet of Things Credit Cards WannaCry Websites Microsoft IT Solutions Wireless Charging Law Enforcement Employer-Employee Relationship Artificial Intelligence Virtualization Collaboration NFL Innovation Browser WIndows Server 2008 Thank You Network Apps Cast Personal Information Remote Computing VoIp Backup IoT Printing Network Security Tech Support Patch Management Vulnerability Computer App store Emergency Managed IT Business Application Project Management Apple Sync Analysis Gifts Email Productivity IT Management Risk Management Router intranet Microsoft Excel Work/Life Balance IT Services Mobile Device Management Devices Monitoring Workers Hackers Specifications Tech Term Google Maps Internet Travel Device Security Marketing Cleaning Networking OneNote Applications Business Continuity Evernote Excel Microsoft Word FAQ Spyware Wireless Internet Chrome Data Management Managing Stress Adobe Business Computing Compliance PowerPoint User Error Alert