Once a month. Educational.

Industry News

Axient Workstation Increases

Dear Valued Clients,   We will be increasing the cost of our Axcient workstation backup product from $15/month to $20/month. This reflects increased costs from the vendor as well as increased costs for our management of the service.  This change only affects...

Windows 10 End of Life Coming October 2025

Windows 10 end of life is on October 14, 2025. After that date, Microsoft will no longer patch Windows 10, resulting in every machine with Windows 10 becoming a security risk. The current version, 22H2, is the final security update for Windows 10.    We have already...

OneDrive Changes Beginning January 2025

An upcoming OneDrive update will change how unlicensed data will be kept. Data stored in unlicensed OneDrive accounts will be inaccessible after January 27th. An example of this in your business could be accounts kept after an employee’s termination.   After Jan 27th,...

Why You Need to Replace Your Old Hardware and Software

Outdated Technology Leads to Security Risks  Most businesses use a technology foundation to protect their data, communicate with employees and customers, and just do their jobs. However, technology constantly evolves, and we know that keeping up with the latest...

Additional M365 Security Features may be needed

If you aren’t already using M365 Business Premium, this article is for you Conditional access explained. Courtesy of Microsoft. If a hacker gains unauthorized access to your company's sensitive data, the repercussions could come as financial loss, legal liabilities,...
MSP Security: Does Your MSP Protect You and Themselves?

MSP Security: Does Your MSP Protect You and Themselves?

To effectively monitor and manage their client’s systems MSPs (Managed service providers) often establish remote connections to all their client’s networks. Unfortunately, those multiple connections make MSPs a prime target for ransomware and hacking.

read more
Our 4 Steps to Save On IT Costs

Our 4 Steps to Save On IT Costs

If your business relies on technology tools, it is important to have a plan for what to do if they fail. At Spire Tech, we can work with you to develop and implement Disaster Recovery Plans to ensure that when catastrophe happens, you are prepared.

read more
How To Layer Your Cybersecurity Approach With Employee Training

How To Layer Your Cybersecurity Approach With Employee Training

Cybersecurity is not something you want to slack on. Too many companies think that installing a suite of antivirus and anti-malware software is enough to protect them from malicious attackers, but in the world of phishing scams and social engineering attacks, that just isn’t enough.

read more

Axient Workstation Increases

Dear Valued Clients,   We will be increasing the cost of our Axcient workstation backup...

Windows 10 End of Life Coming October 2025

Windows 10 end of life is on October 14, 2025. After that date, Microsoft will no longer patch...

OneDrive Changes Beginning January 2025

An upcoming OneDrive update will change how unlicensed data will be kept. Data stored in...

Why You Need to Replace Your Old Hardware and Software

Outdated Technology Leads to Security Risks  Most businesses use a technology foundation to...

Additional M365 Security Features may be needed

If you aren’t already using M365 Business Premium, this article is for you Conditional access...
MSP Security: Does Your MSP Protect You and Themselves?

MSP Security: Does Your MSP Protect You and Themselves?

To effectively monitor and manage their client’s systems MSPs (Managed service providers) often establish remote connections to all their client’s networks. Unfortunately, those multiple connections make MSPs a prime target for ransomware and hacking.

read more
Our 4 Steps to Save On IT Costs

Our 4 Steps to Save On IT Costs

If your business relies on technology tools, it is important to have a plan for what to do if they fail. At Spire Tech, we can work with you to develop and implement Disaster Recovery Plans to ensure that when catastrophe happens, you are prepared.

read more
How To Layer Your Cybersecurity Approach With Employee Training

How To Layer Your Cybersecurity Approach With Employee Training

Cybersecurity is not something you want to slack on. Too many companies think that installing a suite of antivirus and anti-malware software is enough to protect them from malicious attackers, but in the world of phishing scams and social engineering attacks, that just isn’t enough.

read more