used with permission from HP Technology at Work Is your company's email providing a tempting route for cyber criminals to attack your business? Hackers continue to target businesses with phishing attacks. Once opened, these malicious email messages can hijack an...
SpireTech Company News and Tips
Scammers are not “friends” to small business owners
used with permission from the FTC, by Rosario Méndez Scammers try to contact people in many ways. They call, email, put ads online, send messages on social media and more. If you own a small business, they’re trying to contact you, too. Lately we’ve been hearing about...
Breaking down silos – tools for better communication and collaboration
used with permission from Microsoft Office Blogs Today’s workforce is spread across more locations than ever before: 37 percent of workers telecommuted to some degree in 2015. Companies occupy multiple locations, and business partnerships span the globe. In...
Why you need to get serious about cybersecurity
used with permission from HP Technology at Work More than half of small and midsize businesses in the U.S. have suffered a cyber attack in the past year—but despite this frightening reality, very few businesses are making IT security a priority this year. That's a big...
CloudBleed and You
You may have heard about a recent vulnerability that has affected Cloudflare, and therefore certain sites that use cloudflare services. Cloudflare is a "Content Delivery Network" or CDN, and is used to speed up websites by acting as a "cache" that sits between...
Increased Security Concerns For Remote Desktop
At SpireTech, we've noticed an increase in certain types of "Brute Force" attacks on Microsoft Windows operating systems, particularly those allowing Remote Desktop. A 'brute force' attack is a repeated automated attempt to gain unauthorized access by...
Redesigned Website
SpireTech has launched a new website! Our new design is intended to simplify and focus our content on how our business can help you with yours. We've also made our site fully mobile responsive with layouts that work on everything from...
Data Breaches That Made Headlines in 2016
used with permission from Norton by Symantec, by Christina Schubert 980 data breaches occurred in 2016. That left an approximate 35,233,317 known records exposed. Over the years, data breaches have become more sophisticated, and cybercriminals target both...
Rent a robot: robots as service providers springing up in a variety of industries
used with the permission of http://thenetwork.cisco.com, by Anne Field Robots as a service providers let customers use robots without spending the money to buy them. Robotic systems can offer businesses a great many benefits: reducing costs, increasing productivity...
What the tech were they thinking?
used with permission from HP Technology at Work Ever think you'd need an olfactory alarm clock? With all the technological advances we've seen this year (e.g., reusable rockets, 2D materials, DIY super batteries), there were also some weird and wonderful items that...