used with permission from SBA.gov, by Anita Campbell Mobile devices pose heightened security risks. Those risks come in several forms. Devices -- including business data saved on them such as call records, contacts, images, videos, documents and email messages -- can...
SpireTech Company News and Tips
SpireTech
Enable or disable Internet Explorer add-ons
How do you manage Internet Explorer add-ons? Perhaps you have an unwanted extension or a pesky toolbar cluttering up your browser. Maybe another program installed an extra toolbar you really don’t need. Or maybe your favorite extension is disabled and you want to...
Keep Your Home Wi-Fi Safe in 7 Simple Steps
used with permission from Norton by Symantec, by Christina Schubert It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads...
How to Turn Off Clutter in Outlook / Office 365
Clutter is a mailbox management feature of Office 365 for Business. (If you don’t have an Office 365 for Business subscription, you will not have this feature.) It analyzes how you process your email and then moves “unimportant” or low-priority email from your Inbox...
3 Technologies for Streamlining Customer Communications
used with permission from SBA.gov, by Anita Campbell Ask the typical small business owner which methods his or her company uses to communicate with customers, and email is likely to be at or near the top of the list. But what happens as your business grows? If your...
5 Red Flags of Identity Theft
used with permission from Norton by Symantec, by Christina Schubert An estimated 11.7 million people are victims of identity theft each year. It is a growing crime and it is expected to grow more with each passing year. There is a big demand for stolen identities...
Who’s the weakest link?
used with permission from HP Technology at Work Even if your business is using updated software, firewalls, and antivirus protection, your employees could create a cybersecurity risk. Common errors that employees at all levels make when using technology may prove...
4 ways to be more proficient in Word 2016
used with permission from Microsoft US Small and Midsize Business Blog #1 Co-author in real time with your team When you and your team members want to collaborate on a document, forget the pain of emailing it back and forth. Forget worrying about what version you're...
Rise in Ransomware Attacks
There has been a significant increase in activity by a malicious ransomware software called Troldesh. We have recognized that systems that are not actively managed or have no system access management policies are exceptionally susceptible to the current version of...
IM on it—why instant messaging is collaboration’s secret weapon
used with permission from Microsoft Office Blogs Implementing an instant messaging platform is important for productivity for teams of all sizes. Enabling a system for quick, informal, easy-to-reference and mobile chats keeps teams connected for nimble...