used with permission from Norton by Symantec, by Christina Schubert It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads...
SpireTech Company News and Tips
SpireTech
How to Turn Off Clutter in Outlook / Office 365
Clutter is a mailbox management feature of Office 365 for Business. (If you don’t have an Office 365 for Business subscription, you will not have this feature.) It analyzes how you process your email and then moves “unimportant” or low-priority email from your Inbox...
3 Technologies for Streamlining Customer Communications
used with permission from SBA.gov, by Anita Campbell Ask the typical small business owner which methods his or her company uses to communicate with customers, and email is likely to be at or near the top of the list. But what happens as your business grows? If your...
5 Red Flags of Identity Theft
used with permission from Norton by Symantec, by Christina Schubert An estimated 11.7 million people are victims of identity theft each year. It is a growing crime and it is expected to grow more with each passing year. There is a big demand for stolen identities...
Who’s the weakest link?
used with permission from HP Technology at Work Even if your business is using updated software, firewalls, and antivirus protection, your employees could create a cybersecurity risk. Common errors that employees at all levels make when using technology may prove...
4 ways to be more proficient in Word 2016
used with permission from Microsoft US Small and Midsize Business Blog #1 Co-author in real time with your team When you and your team members want to collaborate on a document, forget the pain of emailing it back and forth. Forget worrying about what version you're...
Rise in Ransomware Attacks
There has been a significant increase in activity by a malicious ransomware software called Troldesh. We have recognized that systems that are not actively managed or have no system access management policies are exceptionally susceptible to the current version of...
IM on it—why instant messaging is collaboration’s secret weapon
used with permission from Microsoft Office Blogs Implementing an instant messaging platform is important for productivity for teams of all sizes. Enabling a system for quick, informal, easy-to-reference and mobile chats keeps teams connected for nimble...
How a Gmail Password Stealing Scam Works
used with permission from Norton by Symantec Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you need to know to...
The wild world of 3D printing
used with permission from HP Technology at Work As you may have heard, 3D printers are going beyond the simple plastic creations we're already familiar with. Way beyond. Scientists, engineers, doctors and creative makers are developing printers for advancements in...