There has been a significant increase in activity by a malicious ransomware software called Troldesh. We have recognized that systems that are not actively managed or have no system access management policies are exceptionally susceptible to the current version of...
SpireTech Company News and Tips
IM on it—why instant messaging is collaboration’s secret weapon
used with permission from Microsoft Office Blogs Implementing an instant messaging platform is important for productivity for teams of all sizes. Enabling a system for quick, informal, easy-to-reference and mobile chats keeps teams connected for nimble...
How a Gmail Password Stealing Scam Works
used with permission from Norton by Symantec Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you need to know to...
The wild world of 3D printing
used with permission from HP Technology at Work As you may have heard, 3D printers are going beyond the simple plastic creations we're already familiar with. Way beyond. Scientists, engineers, doctors and creative makers are developing printers for advancements in...
Time to Change Your LinkedIn Passwords! 117 Million Credentials Have Been Breached.
used with permission from Norton by Symantec, by Nadia Kovacs In 2012, LinkedIn suffered a data breach of six million user account names and passwords. Apparently, that breach is extremely larger than originally reported. A Russian hacker going by the name of “Peace”...
How Office 365 will save your business money
Moving into the cloud can be a daunting task, but if your company is looking to update from a legacy version of Microsoft Office then Office 365 will almost always be the most cost effective upgrade route. SpireTech can help make the transition painless. The biggest...
How to work from home and look good doing it
used with permission from Microsoft Office Blogs In the last decade, the mobile workforce has increased by more than 100 percent—not that surprising when we consider the abundant improvement in technology over that same time period. Telecommuting offers wonderful...
Critical Vulnerabilities Affecting QuickTime for Windows
used with permission from Norton by Symantec, by Christina Schubert Two zero-day vulnerabilities showed up recently that could spell trouble for those who use QuickTime for Windows. The ZDI-16-241 and ZDI-16-242 vulnerabilities allow an attacker to run malware or...
What is Grayware, Adware, and Madware?
used with permission from Norton by Symantec, by Nadia Kovacs If you're like most Internet users, you've never even heard of grayware, adware or madware. That's because these are all lower on the threat scale in the world of malicious programming. What's more, they...
What Are Some of the Laws Regarding Internet and Data Security?
used with permission from Norton by Symantec, by Nadia Kovacs Numerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act arguably being the foundation for it all. The Privacy Act passed to establish control...
