used with permission from Microsoft Office Blogs In the last decade, the mobile workforce has increased by more than 100 percent—not that surprising when we consider the abundant improvement in technology over that same time period. Telecommuting offers wonderful...
SpireTech Company News and Tips
Critical Vulnerabilities Affecting QuickTime for Windows
used with permission from Norton by Symantec, by Christina Schubert Two zero-day vulnerabilities showed up recently that could spell trouble for those who use QuickTime for Windows. The ZDI-16-241 and ZDI-16-242 vulnerabilities allow an attacker to run malware or...
What is Grayware, Adware, and Madware?
used with permission from Norton by Symantec, by Nadia Kovacs If you're like most Internet users, you've never even heard of grayware, adware or madware. That's because these are all lower on the threat scale in the world of malicious programming. What's more, they...
What Are Some of the Laws Regarding Internet and Data Security?
used with permission from Norton by Symantec, by Nadia Kovacs Numerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act arguably being the foundation for it all. The Privacy Act passed to establish control...
Who’s afraid of IPv6? You shouldn’t be!
Used with the permission of http://thenetwork.cisco.com, by Scott Gurvey Are you ready for IPv6? With the Internet running out of IPv4 addresses, the time is now, ready or not. What is it and what do you have to do to make the transition. 2015 will go down in history...
Why you should (or shouldn’t) adopt SaaS
used with permission from HP Technology at Work It wasn't long ago that businesses only had two options when it came to purchasing software: purchasing the product off the shelf or purchasing a license agreement for the software. Even with available on-site...
Sneaky Spammer Tactics and How To Avoid Them
used with permission from Norton by Symantec, by Nadia Kovacs Spam is a problem on the Internet, coming at us from just about every angle of the online space. Some spammers develop sophisticated, well-planned strategies, while others can be sloppy and still drive...
Biometrics: How Do They Work? Are They Safe?
used with permission from Norton by Symantec, by Nadia Kovacs Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you login...
How long before you step into a driverless vehicle?
Used with the permission of http://thenetwork.cisco.com, by Jason Deign From the trucking industry to Uber, the automotive industry is alive with talk about letting robots take the wheel. There's a scene missing from all those flash auto ads parading across our...
Technology Usage and the Physical Effects on Your Body
used with permission from Norton by Symantec, by Nadia Kovacs Sure, there are plenty of amazing positives to technology but, as with most things, a fair share of negatives exists as well. One of the negatives technology presents is the physical effect on the body,...