(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Your Computer Might Be Sharing Data with its Manufacturer

Your Computer Might Be Sharing Data with its Manufacturer

It is our hope that you are aware of how much of a risk spyware can pose to your business. Your business generates, collects, and leverages truly considerable amounts of data each day that is intended for your business only. While spyware that is introduced by a hacker is clearly a bad thing, what if the manufacturer of the device installed a program that pulled data from your machine?

Well, if you have a desktop workstation or laptop that was produced by HP, there’s a good chance that it is happening to you right now.

It appears that a software, called HP Touchpoint Analytics, had been bundled in with a Windows Update. This software is a part of the larger HP Touchpoint Manager and sends HP an unknown cache of data from the device on a daily basis. According to HP, this is to help relieve “time-consuming tasks of device support and lifecycle management.”

While this may sound like a beneficial service, it still doesn’t explain why HP doesn’t ask for permission to install it.

If you would rather not have a program like this on your business devices, sharing an unknown data sample with HP, it is fortunately simple enough for IT to uninstall. All they have to do is check the Windows Services interface for “HP Touchpoint Analytics Client,” disable it, and uninstall it from your installed programs list.

If your IT team needs assistance in adding this to their other responsibilities, OnSite I.T. is here to help. Give us a call at (403) 210-2927 to learn more about how we can give your internal IT resources a helping hand.

Are You Prepared to Go Paperless?
Tip of the Week: Five Ways to Use Your Android Pho...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Tech Term Privacy Internet Cybersecurity Smartphones Cloud User Tips Malware Communication Efficiency Browser Hardware Android Wi-Fi Productivity Microsoft Passwords Users Communications Saving Money Mobile Device Windows 10 Managed IT services Email Ransomware Data Google Small Business Software Network Hosted Solutions Information Innovation Networking Managed IT Services Backup Business Intelligence Data Backup Social Media Business Wireless Business Management Applications Workplace Tips VoIP Internet of Things Mobile Devices Employer-Employee Relationship Collaboration Blockchain IT Support Marketing Data recovery Outsourced IT Analytics Wireless Charging Automation Cortana Cost Management Tech Terms Miscellaneous Artificial Intelligence Managed Service Data Protection IT Services Smartphone Virtual Assistant Bandwidth Phishing Compliance Patch Management Data Breach Computer VPN Connectivity BDR Excel Cloud Computing Virtualization Gmail Router Save Money Remote Computing Hackers Data Management Computers Government Managed IT Service Downloads Error Technology Tips Troubleshooting Apple Telecommuting Big Data Knowledge PowerPoint Medical IT Document Management Office 365 Bring Your Own Device Internet Explorer Analysis Hard Drive Virus Conferencing RAM Authorization IT budget Inventory Wireless Internet Law Enforcement Telephony Trends Update iPhone Workers Database Amazon Lead Generation Sports SaaS Paperless Office Dongle Tip of the week Environment Hybrid Cloud Online Shopping Network Attached Storage Business Technology Spam Threat Processors Antivirus Office Microsoft Teams Mobile Security Voice over IP A.I. Touchscreen Physical Security Backup and Disaster Recovery Outlook Millennials Cybercrime Machine Learning GDPR Digital User Tip e-waste Cables Password Printing Vulnerability Staff Content Filtering Company Culture Operating System File Sharing Holiday Movies Microsoft Office 365 Laptop SSD Profitability Tactics Plug-In Storage Edge disposal Voice over Internet Protocol Settings Sales Paper Spyware Managing Stress IT Management eCommerce Telecommute Hard Drives Comparison Apps Safety Access Control Facebook Eliminating Downtime Chrome Proactive IT WannaCry Streaming Media Dark Web How To Value Battery Server Management Tablet Gadgets Ink Reporting HP Websites Server Microsoft Office G Suite User Security HIPAA Data loss Specifications Unified Communications Authentication Twitter BYOD Maintenance Remote Monitoring and Management IP Address Website Customer Service Mobile Office Upgrade Managed Service Provider Domains Hiring/Firing Quick Tips Mobile Device Management Windows 10 Public Speaking Fun Two-factor Authentication Presentation Remote Monitoring Lithium-ion battery Disaster Recovery Augmented Reality Tech Support Regulation Wireless Technology 5G IBM Alert Hacker Printers The Internet of Things Productivity Search Budget Competition Customer Relationship Management