used with permission from Microsoft Office Blogs Implementing an instant messaging platform is important for productivity for teams of all sizes. Enabling a system for quick, informal, easy-to-reference and mobile chats keeps teams connected for nimble...
SpireTech Company News and Tips
How a Gmail Password Stealing Scam Works
used with permission from Norton by Symantec Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you need to know to...
The wild world of 3D printing
used with permission from HP Technology at Work As you may have heard, 3D printers are going beyond the simple plastic creations we're already familiar with. Way beyond. Scientists, engineers, doctors and creative makers are developing printers for advancements in...
Time to Change Your LinkedIn Passwords! 117 Million Credentials Have Been Breached.
used with permission from Norton by Symantec, by Nadia Kovacs In 2012, LinkedIn suffered a data breach of six million user account names and passwords. Apparently, that breach is extremely larger than originally reported. A Russian hacker going by the name of “Peace”...
How Office 365 will save your business money
Moving into the cloud can be a daunting task, but if your company is looking to update from a legacy version of Microsoft Office then Office 365 will almost always be the most cost effective upgrade route. SpireTech can help make the transition painless. The biggest...
How to work from home and look good doing it
used with permission from Microsoft Office Blogs In the last decade, the mobile workforce has increased by more than 100 percent—not that surprising when we consider the abundant improvement in technology over that same time period. Telecommuting offers wonderful...
Critical Vulnerabilities Affecting QuickTime for Windows
used with permission from Norton by Symantec, by Christina Schubert Two zero-day vulnerabilities showed up recently that could spell trouble for those who use QuickTime for Windows. The ZDI-16-241 and ZDI-16-242 vulnerabilities allow an attacker to run malware or...
What is Grayware, Adware, and Madware?
used with permission from Norton by Symantec, by Nadia Kovacs If you're like most Internet users, you've never even heard of grayware, adware or madware. That's because these are all lower on the threat scale in the world of malicious programming. What's more, they...
What Are Some of the Laws Regarding Internet and Data Security?
used with permission from Norton by Symantec, by Nadia Kovacs Numerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act arguably being the foundation for it all. The Privacy Act passed to establish control...
Who’s afraid of IPv6? You shouldn’t be!
Used with the permission of http://thenetwork.cisco.com, by Scott Gurvey Are you ready for IPv6? With the Internet running out of IPv4 addresses, the time is now, ready or not. What is it and what do you have to do to make the transition. 2015 will go down in history...