used with permission from HP Technology at Work What is EMV chip card technology? Is it really more secure than magnetic stripe technology? Is compliance worth the cost of upgrading? It’s been over a month since the "EMV liability shift" went into effect in the U.S....
SpireTech Company News and Tips
Year: 2015
A new kind of smart car
used with the permission of http://thenetwork.cisco.com, by Mary Gorges With things like Bluetooth, sensors, cameras and even satellite radio becoming commonplace in today’s modern car, our vehicles are already ultra connected. But what if cars themselves were...
Encourage your kids to participate in the Hour of Code™
Computer science is a foundation for every student. Join us in encouraging your kids to try the Hour of Code. It's easy, free, and fun. My 12-yr old daughter tried an hour of Minecraft coding this weekend and enjoyed it. Sign up at hourofcode.com where...
SpireTech achieves Microsoft Cloud Service Provider 1-Tier status
SpireTech is excited to announce that we have been accepted into Microsoft's CSP (Cloud Service Provider) program at the direct, 1-Tier level. SpireTech clients can now enjoy unified billing, support, and management services for Office 365 and Azure products....
Safe Online Shopping For The Holiday Season
used with permission from Norton by Symantec, by Nadia Kovacs The holidays are just around the corner, and that means many of us will be making purchases online to avoid large crowds and busy mall traffic, especially during Black Friday and Cyber Monday. Sometimes it...
The state of the cloud: Adoption is rising
used with the permission of http://thenetwork.cisco.com by Laurence Cruz Survey: Cloud adoption climbs but strategy lags—even as forward-thinking companies recognize both will help them capitalize on upcoming market transitions. Cloud adoption is on the rise and...
Ransomware: 5 Do’s And Don’ts
used with permission from Norton by Symantec By Kevin Haley, Director, Symantec Security Response I despise all forms of bullying. Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you, and refuses to give it back. It's...
What Is Spear Phishing?
used with permission from Norton by Symantecby Nadia Kovacs Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for...
Government warns IT professionals about Cybercrime
We've had the privilege over the last couple of months to attend a couple of IT and tech industry conferences. The NSA, FBI, and Homeland Security had speakers at these conferences and they are sending a message: US Businesses are the target of...
PortlandCloud v5.0 Upgrade
The latest update to our PortlandCloud.com portal brings a whole new look to CTERA's hybrid cloud appliances, and several new features to cloud drive! Here are some of the highlights: All-New User Interface Snazzy new interface with HTML-5 goodness. The...