Out of the Box Solutions Blog

Your Computer Might Be Sharing Data with its Manufacturer

Your Computer Might Be Sharing Data with its Manufacturer

It is our hope that you are aware of how much of a risk spyware can pose to your business. Your business generates, collects, and leverages truly considerable amounts of data each day that is intended for your business only. While spyware that is introduced by a hacker is clearly a bad thing, what if the manufacturer of the device installed a program that pulled data from your machine?

Well, if you have a desktop workstation or laptop that was produced by HP, there’s a good chance that it is happening to you right now.

It appears that a software, called HP Touchpoint Analytics, had been bundled in with a Windows Update. This software is a part of the larger HP Touchpoint Manager and sends HP an unknown cache of data from the device on a daily basis. According to HP, this is to help relieve “time-consuming tasks of device support and lifecycle management.”

While this may sound like a beneficial service, it still doesn’t explain why HP doesn’t ask for permission to install it.

If you would rather not have a program like this on your business devices, sharing an unknown data sample with HP, it is fortunately simple enough for IT to uninstall. All they have to do is check the Windows Services interface for “HP Touchpoint Analytics Client,” disable it, and uninstall it from your installed programs list.

If your IT team needs assistance in adding this to their other responsibilities, Out of the Box Solutions is here to help. Give us a call at 800-750-4OBS (4627) to learn more about how we can give your internal IT resources a helping hand.

Are You Prepared to Go Paperless?
Tip of the Week: Five Ways to Use Your Android Pho...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, October 15 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Privacy Cybersecurity Smartphones Internet Android Cloud Malware Communication Productivity Hardware User Tips Efficiency Browser Communications Saving Money Data Microsoft Passwords Managed IT services Small Business Ransomware Blockchain Network Applications Workplace Tips Users Backup Wi-Fi Mobile Devices Mobile Device Social Media Hosted Solutions Business Management Email Employer-Employee Relationship Windows 10 VoIp Innovation Collaboration Business Intelligence IT Support Google VPN Managed IT Service BDR Data Management Outsourced IT Computers Remote Computing Information Patch Management Save Money Computer Data recovery Business Internet of Things Tech Terms Managed IT Services Networking Wireless Automation Compliance Hackers Cortana Artificial Intelligence Analytics Cloud Computing Virtual Assistant Bandwidth Wireless Charging Gmail Cost Management Software Marketing Data Backup Virtualization IT Services Millennials Websites Internet Explorer Inventory Spyware Unified Communications Medical IT Cybercrime Big Data Authentication Backup and Disaster Recovery WannaCry Downloads Server Management Analysis e-waste Edge G Suite Virus Error Tablet Server Sports SaaS Business Technology Safety Settings Threat Troubleshooting Conferencing Data Protection HP RAM Tactics Authorization Hard Drives HIPAA Trends Managed Service disposal Bring Your Own Device Antivirus Excel Plug-In GDPR Printing IT budget Update Office Mobile Security Document Management Microsoft Teams Telecommute Telecommuting Holiday Physical Security SSD Hard Drive A.I. Tip of the week Value Hybrid Cloud Staff Touchscreen Knowledge Office 365 Lead Generation Connectivity Network Attached Storage Proactive IT Phishing Dongle Battery Paper Content Filtering Operating System Paperless Office Company Culture Smartphone eCommerce Maintenance Laptop Comparison Facebook Processors Movies User Tip Cables Microsoft Office 365 Telephony Technology Tips Apps Password Remote Monitoring and Management Storage Data Breach Ink Digital Managing Stress Data loss Workers Online Shopping Router Miscellaneous Specifications Twitter Vulnerability Machine Learning Reporting Database Voice over Internet Protocol Access Control Voice over IP Streaming Media Microsoft Office Dark Web Sales Government PowerPoint IT Management Amazon Gadgets Environment Spam Printers Alert Quick Tips Outlook Disaster Recovery Regulation