Think about this scenario: A friend tells you that they received a message from your email address that wasn’t really sent from you. They think you’ve been hacked and your account is sending malicious emails to friends. How do you know if your email address...
SpireTech Company News and Tips
SpireTech
Improving business efficiency with AI
used with permission from Microsoft Industry Blogs Small businesses can use AI to improve their bottom line Chatbots cut business costs by $20 million last year. By 2022, that savings is expected to jump to $8 billion.[1] That’s an increase of about 75% in five...
Windows 10 Tip: Schedule items by dragging a task to your calendar
used with permission from Microsoft, by Athima Chansanchai If you need to allot time to take care of the items on your to-do list, wouldn’t it be great if you could drag and drop those tasks right into your calendar? Now, you can. The new Tasks experience in...
Essential Steps to Handle Negative Reviews
used with permission from SBA.gov., by Anita Campbell Bad online reviews can cause potential customers to shop elsewhere, negatively impacting your business’ bottom line. If your business has received a bad online review, here are steps you can take to handle it and...
Cybersecurity for small business: Ransomware
used with permission from FTC.gov., by Andrew Smith, Director, FTC Bureau of Consumer Protection Mention the word “ransomware” at a meeting of small business owners and you’ll feel the temperature in the room drop by 20 degrees. A ransomware attack is a chilling...
2018 is Heading for the Finish Line!
We are starting to hear from clients interested in IT capital expenditures or projects they want to accomplish before the end of the calendar year for both operational and tax deduction purposes – in many instances equipment purchases and IT projects can be...
Online scammers cost time and money. Here’s how to fight back.
used with permission from Microsoft On the Issues, by Athima Chansanchai A message pops up on your screen. It screams that your computer is at risk or has been infected by a virus. Or, you receive a phone call from someone claiming to be from tech support. And then,...
Fend off cybercriminals with better business security practices
used with permission from Tektonika (HP), by Karen Gilleland “Gimme the dough—or you’ll never see your files again!” In this scenario, the thug in the mask is ransomware, and it’s only one of the ways cybercriminals attack businesses—which are often left vulnerable...
Warn your friends about tech support scams
used with permission from FTC.gov., by Amy Hebert Tech support scams, which get people to pay for fake computer help or steal their personal information, are convincing. You might already know the signs of a tech support scam, but do your friends and family? Here’s...
Don’t let the old hardware blues undermine office security
used with permission from Tektonika (HP), by Karen Gilleland Unlike fine wine, your cyber assets don’t get better with age. Any PC more than four years old is not only costly to keep, but it’s also hack-friendly tech that could pose serious office security risk. Old...