used with permission from HP Technology at Work Even if your business is using updated software, firewalls, and antivirus protection, your employees could create a cybersecurity risk. Common errors that employees at all levels make when using technology may prove...
SpireTech Company News and Tips
SpireTech
4 ways to be more proficient in Word 2016
used with permission from Microsoft US Small and Midsize Business Blog #1 Co-author in real time with your team When you and your team members want to collaborate on a document, forget the pain of emailing it back and forth. Forget worrying about what version you're...
Rise in Ransomware Attacks
There has been a significant increase in activity by a malicious ransomware software called Troldesh. We have recognized that systems that are not actively managed or have no system access management policies are exceptionally susceptible to the current version of...
IM on it—why instant messaging is collaboration’s secret weapon
used with permission from Microsoft Office Blogs Implementing an instant messaging platform is important for productivity for teams of all sizes. Enabling a system for quick, informal, easy-to-reference and mobile chats keeps teams connected for nimble...
How a Gmail Password Stealing Scam Works
used with permission from Norton by Symantec Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you need to know to...
The wild world of 3D printing
used with permission from HP Technology at Work As you may have heard, 3D printers are going beyond the simple plastic creations we're already familiar with. Way beyond. Scientists, engineers, doctors and creative makers are developing printers for advancements in...
Time to Change Your LinkedIn Passwords! 117 Million Credentials Have Been Breached.
used with permission from Norton by Symantec, by Nadia Kovacs In 2012, LinkedIn suffered a data breach of six million user account names and passwords. Apparently, that breach is extremely larger than originally reported. A Russian hacker going by the name of “Peace”...
How to work from home and look good doing it
used with permission from Microsoft Office Blogs In the last decade, the mobile workforce has increased by more than 100 percent—not that surprising when we consider the abundant improvement in technology over that same time period. Telecommuting offers wonderful...
Critical Vulnerabilities Affecting QuickTime for Windows
used with permission from Norton by Symantec, by Christina Schubert Two zero-day vulnerabilities showed up recently that could spell trouble for those who use QuickTime for Windows. The ZDI-16-241 and ZDI-16-242 vulnerabilities allow an attacker to run malware or...
What is Grayware, Adware, and Madware?
used with permission from Norton by Symantec, by Nadia Kovacs If you're like most Internet users, you've never even heard of grayware, adware or madware. That's because these are all lower on the threat scale in the world of malicious programming. What's more, they...