As many Windows 10 users have found out, the new update procedures can cause massive problems for users. No longer can you delay updates until it is convenient - only reboots. Now windows will run updates as soon as Microsoft decides you need them, and worst of...
SpireTech Company News and Tips
Enable or disable Internet Explorer add-ons
How do you manage Internet Explorer add-ons? Perhaps you have an unwanted extension or a pesky toolbar cluttering up your browser. Maybe another program installed an extra toolbar you really don’t need. Or maybe your favorite extension is disabled and you want to...
Keep Your Home Wi-Fi Safe in 7 Simple Steps
used with permission from Norton by Symantec, by Christina Schubert It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads...
How to Turn Off Clutter in Outlook / Office 365
Clutter is a mailbox management feature of Office 365 for Business. (If you don’t have an Office 365 for Business subscription, you will not have this feature.) It analyzes how you process your email and then moves “unimportant” or low-priority email from your Inbox...
3 Technologies for Streamlining Customer Communications
used with permission from SBA.gov, by Anita Campbell Ask the typical small business owner which methods his or her company uses to communicate with customers, and email is likely to be at or near the top of the list. But what happens as your business grows? If your...
5 Red Flags of Identity Theft
used with permission from Norton by Symantec, by Christina Schubert An estimated 11.7 million people are victims of identity theft each year. It is a growing crime and it is expected to grow more with each passing year. There is a big demand for stolen identities...
Who’s the weakest link?
used with permission from HP Technology at Work Even if your business is using updated software, firewalls, and antivirus protection, your employees could create a cybersecurity risk. Common errors that employees at all levels make when using technology may prove...
Spire attends HostingCon Global 2016 conference
At Spire, we're constantly on the lookout for new technology that gives us or our clients the competitive edge. While we don't want to be bleeding edge, we do want to be ahead of the mainstream. We take vendor and technology selection very seriously, and only a few...
4 ways to be more proficient in Word 2016
used with permission from Microsoft US Small and Midsize Business Blog #1 Co-author in real time with your team When you and your team members want to collaborate on a document, forget the pain of emailing it back and forth. Forget worrying about what version you're...
Rise in Ransomware Attacks
There has been a significant increase in activity by a malicious ransomware software called Troldesh. We have recognized that systems that are not actively managed or have no system access management policies are exceptionally susceptible to the current version of...