Ask a business person where their office is located and the likely answer is “everywhere.” They’re working from home, staying in the loop while traveling, and catching up on email between sales calls. For productivity’s sake, many companies give their employees – and...
SpireTech Company News and Tips
SpireTech
Tips to Improve Your Cybersecurity in 2018
2018 is right around the corner, and here are our top five tips for things you can do to improve your cybersecurity in the new year. Cybersecurity has been the most critical issue in 2017, and that’s not going to change. If you haven’t begun addressing your...
3 Security Advantages of Managed IT Services
Managed IT services, or outsourced remote network management, can help your business in many ways. It’s a cost effective way of having your IT infrastructure monitored and maintained by experts instead of hiring an IT director. Or, it can free up your IT director and...
Defending against ransomware using system design
used with permission from Microsoft Secure, by Michael Melone, Principal Cybersecurity Consultant, Enterprise Cybersecurity Group Earlier this year, the world experienced a new and highly-destructive type of ransomware. The novel aspects of WannaCry and Petya were not...
Stick with Security: Segment your network and monitor who’s trying to get in and out
used with permission from FTC.gov., by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection Who’s coming in and what’s going out? Businesses that want to stick with security build commonsense monitoring into their brick-and-mortar operations. Whether...
When Is a Simple Data Backup Not Enough?
You know you need data backup, but when do you need a business continuity solution? If you’ve been paying attention to the news, you’ll know that massive global ransomware attacks are only growing in scale and frequency. These attacks and other threats and accidents...
The dark web: What your business needs to know
used with permission from FTC.gov., by John Krebs You’ve heard about the “dark web” and wondered how it affects businesses – including small businesses. That was one of the topics addressed at an FTC conference earlier this year on identity theft. Recent headlines...
Businesses beware: Researchers spot bug in Wi-Fi network encryption
used with permission from FTC.gov., by Phoebe Rouge You’ve read recent news stories about a vulnerability discovered in the WPA2 encryption standard. (Some reports refer to it as KRACK – Key Reinstallation Attack.) Should this be of concern to your business? Yes. Does...
Are social logins safe to use?
used with permission from Norton by Symantec By now you’ve noticed you typically have two options to log in to an online account. One is the traditional username and password combination. The other is the social login, which uses your credentials for a social...
A Short Guide to Data Security Practices for Your Business
Much has been said about data security practices and cybersecurity measures that businesses should follow. All the information and recommendations out there can be confusing and overwhelming. Large data breaches and multiple scary ransomware attacks have dominated the...
