Much has been said about data security practices and cybersecurity measures that businesses should follow. All the information and recommendations out there can be confusing and overwhelming. Large data breaches and multiple scary ransomware attacks have dominated the...
SpireTech Company News and Tips
Management
Why bother with updates and upgrades?
When was the last time you thought about software updates and hardware upgraes? For many, updating software and hardware is not a priority because “If it ain’t broke, don’t fix it”. However, it’s clear that today’s cyber attacks prey on vulnerabilities present in old...
Start with security – and stick with it
used with permission from SBA.gov, by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection When it comes to data security, what’s reasonable will depend on the size and nature of your business and the kind of data you deal with. But certain principles...
Why you need to get serious about cybersecurity
used with permission from HP Technology at Work More than half of small and midsize businesses in the U.S. have suffered a cyber attack in the past year—but despite this frightening reality, very few businesses are making IT security a priority this year. That's a big...
From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in the Workplace
used with permission from Norton by Symantec, by Nadia Kovacs Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits… all...
Tune Up Your Telephone Skills
How do you sound to your customers and co-workers? First impressions are lasting impressions. That's why every telephone conversation counts. The impression you make on your co-workers and customers is based on your tone of voice, energy and attitude. Because so many...
Who’s the weakest link?
used with permission from HP Technology at Work Even if your business is using updated software, firewalls, and antivirus protection, your employees could create a cybersecurity risk. Common errors that employees at all levels make when using technology may prove...
8 ways to successfully lead your mobile workforce
used with permission from Microsoft Office Blogs For many of us, the rise of the remote workforce comes as no surprise. For years now, office workers have been abandoning their desks in favor of settings that are farther afield and allow them to work in a more...
The best way to prepare for disasters and security breaches
used with permission from HP Technology at Work What would happen if your company lost your critical business data? Whether your application is email, your website, accounts receivable or any other critical application, your IT infrastructure is...
Summer Slowdown? Make the Most of It
used with permission from SBA.gov by Sarah Field While some seasonal businesses hit primetime during the summer, many others see a major slow-down as clients and customers go on vacation (and as new projects are postponed until after said vacationing.) Never fear –...