Heart of Texas Network Consultants Blog

At What Point Does a Service Become Spyware?

At What Point Does a Service Become Spyware?

Spyware, like other malware, is a problem for any organization. Since your business generates, collects, and uses considerable amounts of data, there are plenty of organizations that want to get their hands on it. You spend so much time and money protecting your data against threats on the Internet, but what if the spyware were to just come standard on the computer you just bought?

HP, one of the most reliable names in business and consumer hardware, has seemingly been doing exactly that, adding a software, HP Touchpoint Analytics, into their Windows Update. The software, which typically is part of the larger HP Touchpoint Manager, regularly sends a random cache of data from the device. The rationale HP gave for this decision was to relieve “time-consuming tasks of device support and lifecycle management.”

Given that explanation, most wouldn’t bat an eye, but HP does this with data that belongs to users, without the user's consent, and for some, that is a major problem. If you are the skeptical type, and would prefer to not have a program with such liberties working on your organization's computers, consider bringing this up to your IT professional and they can ensure any software that isn’t vital is removed, and working properly.

If you’d like to try your hand at disabling it you need to search Windows Services and disable “HP Touchpoint Analytics Client”, then uninstall it from your installed software list in Windows 10.


If you want to talk about a software strategy that truly suits your business, call Heart of Texas Network Consultants today at (254) 848-7100.

How to Leave Fake Tech Support Hanging
Tip of the Week: Are You at Risk Due to the IoT?
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, July 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Server Tablet Miscellaneous Outsourced IT IT Support Computers Social Printer Tech Support Cloud Computing Maintenance Business Management Backup App VoIP Money Upgrade Ransomware Innovation Big Data Mobile Office Social Networking Bring Your Own Device Vendor Management Phishing Cost Management Mobile Computing Password Software Cybersecurity Office Malware Alert Windows Tip of the Week Hacking Office Tips Networking OneNote Retail IT Services Saving Money Windows 10 User Tips Unified Threat Management Data Security Google Operating System Virtualization Android Small Business iPhone Mobile Devices Efficiency Quick Tips Government Cybercrime Smartphones Communication Managed IT Services BDR Artificial Intelligence Workplace Tips Users Save Money Update Technology Managed IT Services Vulnerability Cloud Current Events Google Drive Email Hardware Applications Information Shortcut Network Security Antivirus Excel Gadgets Law Enforcement Education IT Support Remote Computing Health Best Practices Business Continuity Data Privacy Going Green Network Humor USB User Error Proactive IT Microsoft Productivity Bandwidth Customer Relationship Management Collaboration Automation Hackers Holiday Security Data Management Windows 8 Social Media Windows 10 Hosted Solution WiFi Hard Drives Application Router Hosted Solutions Computer Information Technology Gmail Managed Service Provider Apps Spam Office 365 Business Computing Data Recovery Wireless Employer-Employee Relationship Two-factor Authentication Mobility Passwords Laptop Unsupported Software Internet of Things Data Backup Risk Management Microsoft Office BYOD Wi-Fi Facebook Tech Term Wireless Technology VPN Chrome PowerPoint Search Internet Smartphone Avoiding Downtime Browser Mobile Device Management History Best Practice Telephone Systems Lithium-ion battery The Internet of Things Encryption Marketing Disaster Recovery Business Productivity communications