used with permission from Norton by Symantec, by Christina Schubert An estimated 11.7 million people are victims of identity theft each year. It is a growing crime and it is expected to grow more with each passing year. There is a big demand for stolen identities...
SpireTech Company News and Tips
Who’s the weakest link?
used with permission from HP Technology at Work Even if your business is using updated software, firewalls, and antivirus protection, your employees could create a cybersecurity risk. Common errors that employees at all levels make when using technology may prove...
Spire attends HostingCon Global 2016 conference
At Spire, we're constantly on the lookout for new technology that gives us or our clients the competitive edge. While we don't want to be bleeding edge, we do want to be ahead of the mainstream. We take vendor and technology selection very seriously, and only a few...
4 ways to be more proficient in Word 2016
used with permission from Microsoft US Small and Midsize Business Blog #1 Co-author in real time with your team When you and your team members want to collaborate on a document, forget the pain of emailing it back and forth. Forget worrying about what version you're...
Rise in Ransomware Attacks
There has been a significant increase in activity by a malicious ransomware software called Troldesh. We have recognized that systems that are not actively managed or have no system access management policies are exceptionally susceptible to the current version of...
IM on it—why instant messaging is collaboration’s secret weapon
used with permission from Microsoft Office Blogs Implementing an instant messaging platform is important for productivity for teams of all sizes. Enabling a system for quick, informal, easy-to-reference and mobile chats keeps teams connected for nimble...
How a Gmail Password Stealing Scam Works
used with permission from Norton by Symantec Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you need to know to...
The wild world of 3D printing
used with permission from HP Technology at Work As you may have heard, 3D printers are going beyond the simple plastic creations we're already familiar with. Way beyond. Scientists, engineers, doctors and creative makers are developing printers for advancements in...
Time to Change Your LinkedIn Passwords! 117 Million Credentials Have Been Breached.
used with permission from Norton by Symantec, by Nadia Kovacs In 2012, LinkedIn suffered a data breach of six million user account names and passwords. Apparently, that breach is extremely larger than originally reported. A Russian hacker going by the name of “Peace”...
How Office 365 will save your business money
Moving into the cloud can be a daunting task, but if your company is looking to update from a legacy version of Microsoft Office then Office 365 will almost always be the most cost effective upgrade route. SpireTech can help make the transition painless. The biggest...