If you aren’t already using M365 Business Premium, this article is for you Conditional access explained. Courtesy of Microsoft. If a hacker gains unauthorized access to your company's sensitive data, the repercussions could come as financial loss, legal liabilities,...
SpireTech Company News and Tips
Security
SpireTech’s Identity Protection Bundle
How this Suite of Services will Provide Multi-Faceted Defense for Business In today's digital landscape, safeguarding business IT infrastructure is more crucial than ever. A single cyberattack can devastate a business, leading to sometimes irreparable damage....
Businesses Need to Back Up Their M365 Data
The Risks of Not Backing Up M365 Data Many businesses use Microsoft 365 for their documents, email, and collaboration. This is what we recommend, in fact, as SpireTech trusts their management and organization of company documents. Many assume that their data is...
How to Stop Phishing Scams in your Business
Running a business requires a lot of responsibility and awareness. In the cyber world, there are many dangers lurking and waiting for the opportunity to attack unsuspecting victims. Here at SpireTech, we believe educating businesses on how to protect themselves is...
How to Avoid Business Email Compromise
Business email compromise (BEC) is an attack where a hacker gains access to an organization’s mailbox or the mailbox of someone an employee’s trust. BEC scams can cost your company a lot of money, compromise data security, and damage a business’ reputation and...
The Impact of Data Breaches and BEC on Business Credibility
Data breaches are something that affect more and more businesses every year. Though the immediate effects can be catastrophic, there are long-lasting effects that remain far after the initial threat has passed. Data Breaches: A Major Threat to Trust and...
The Great Phone Upgrade: What to do BEFORE Trading in Your Phone
In the grand scheme of life’s big decisions, trading in your old phone for a new one might not seem like a big deal. But let’s face it, our phones are more than just devices. We missed out on the promised flying cars of the future and got tech we bring to the bathroom...
QR Codes are being used in Phishing Attacks
QR codes are being used to deliver phishing links. In a phishing campaign estimated to have launched in May 2023, threat actors utilize QR codes to redirect users to a harmful location. This campaign targets someone’s Microsoft credentials and asks them to...
Ransomware a bigger threat than ever: 2023 Crypto Crime Mid-Year Update
Chainanalysis, a data firm that specializes in blockchain information, has released a mid-year report on crypto crime. Ransomware comes out swinging So far in 2023, ransomware is the only type of cryptocurrency-based crime that has seen an increase...
Microsoft to enforce number matching in Authenticator app. Updated May 2023.
From the Microsoft Blog. Beginning May 8, 2023, Microsoft will start enforcing number matching for all users who have MFA enabled on their Microsoft 365 account. Number matching in authentication procedures refers to displaying a number on one device (typically a...