used with permission from HP Technology at Work More than half of small and midsize businesses in the U.S. have suffered a cyber attack in the past year—but despite this frightening reality, very few businesses are making IT security a priority this year. That's a big...
SpireTech Company News and Tips
SpireTech
Data Breaches That Made Headlines in 2016
used with permission from Norton by Symantec, by Christina Schubert 980 data breaches occurred in 2016. That left an approximate 35,233,317 known records exposed. Over the years, data breaches have become more sophisticated, and cybercriminals target both...
Rent a robot: robots as service providers springing up in a variety of industries
used with the permission of http://thenetwork.cisco.com, by Anne Field Robots as a service providers let customers use robots without spending the money to buy them. Robotic systems can offer businesses a great many benefits: reducing costs, increasing productivity...
What the tech were they thinking?
used with permission from HP Technology at Work Ever think you'd need an olfactory alarm clock? With all the technological advances we've seen this year (e.g., reusable rockets, 2D materials, DIY super batteries), there were also some weird and wonderful items that...
3 ways to convert a Word document to a PDF
Sometimes you need to convert your Word document (.doc or .docx) to a PDF, so you can share it more readily, or protect its contents from modification. But how do you do that? Here are 3 ways to convert a Word document. Method #1: Use Save As in Word This is the...
Protect or pay: 10 tips for safer online shopping this holiday
used with the permission of http://thenetwork.cisco.com, by Blake Snow What's a consumer to do in the age of online holiday shopping? Where there's money there are thieves nearby. That's the biggest risk facing online shoppers today, whether through phishing, stolen...
5 ways you need to work at home to feel like you never left the office
used with permission from Microsoft Office Blogs Whether you're a full- or part-time telecommuter, or you just like to catch up on projects at home or on the go—you're not alone. According to Global Workplace Analytics, the number of people who work at home, not...
From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in the Workplace
used with permission from Norton by Symantec, by Nadia Kovacs Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits… all...
10 Ways to Keep Your Mobile Devices (and the Data on Them) More Secure
used with permission from SBA.gov, by Anita Campbell Mobile devices pose heightened security risks. Those risks come in several forms. Devices -- including business data saved on them such as call records, contacts, images, videos, documents and email messages -- can...
Enable or disable Internet Explorer add-ons
How do you manage Internet Explorer add-ons? Perhaps you have an unwanted extension or a pesky toolbar cluttering up your browser. Maybe another program installed an extra toolbar you really don’t need. Or maybe your favorite extension is disabled and you want to...