Blog Post Archive - Archives
Like many of our clients, we’ll be closed Friday July 3rd in observance of Independence day, which falls on Saturday this year. We hope everyone enjoys the three-day weekend.
Many things are changing in the world right now, and technology is no exception. As usual, we are spending a lot of time on R&D, training, and investigating new technology. Why do you care? Because we see certain technologies being key enablers for our clients moving forward. We’re already using most of these technologies (accelerated by WFH), and many clients are rethinking the way they want to work.
If you don’t know about these key enablers, you should, because they are disruptive technologies. We’ll give you a primer here, with the “why” for each.
|Azure AD||Enables security in a WFH, cloud-first workplace|
|Intune||Automatic software deployment, enforcement of company IT standards, mobile device security|
|Autopilot||Automatic setup and configuration of new computers, anywhere|
|SharePoint||File sharing without a server, simultaneous document editing|
|OneDrive||Easy access to SharePoint and backup of local documents|
|Teams||Team chat, meetings, calls, and collaboration|
|Microsoft 365 Business Voice||Potentially disruptive extension to teams calling and traditional business phone systems|
Many of these features are things you’re already paying for, and others present minimal additional cost. Read more...
Just a quick note to let clients know that if you are still running Windows 7 or 2008 server, we cannot be responsible for the security of your network. The risk of ransomware is real, and we’ve heard many horror stories of companies that have been breached. Being able to apply security updates to your computers is one of the key defenses you have against this risk.
In accordance with our policies, we reserve the right to invoice for technical support of software that does not have vendor support. As a courtesy, we will extend free support for 15 minutes, after which we will request approval to bill for our time. We do not wish to impose hardship, but aged software and hardware does require more time to support than modern software, and we must balance this against the need for security. Read more...
In case you missed it last month, we’ve licensed specialized software that runs in Azure that optionally enables additional security for our clients using Office 365. The software works to automatically keep security tight, and alert on suspicious logins and emails. To learn more, please visit:
With work from home, we’re noticing an increase in the number of machines being shut off when we are trying to install updates. Please remember to log off and leave your computers turned on and connected to power when we prompt you for updates.
Thank you for your cooperation. Read more...
Security vendor Sophos disclosed that during the breach we wrote about last month, hackers tried and failed to install ransomware. The firewalls which received the hotfix blocked the subsequent attempts to install ransomware – this includes all SpireTech VIPsupport customers. Hopefully, this underscores the importance of having a team paying attention to this sort of thing for your business and acting promptly when it matters.
For all the gory details, you can visit https://news.sophos.com/en-us/2020/05/21/asnarok2/ Read more...
We are thrilled to announce that Intercept X received a 100% total accuracy rating in the enterprise, SMB, and consumer protection tests by SE Labs.
Whether you are protecting your employees at work, or them and their families at home, you will get outstanding protection with Intercept X technology. It’s important that employees working from home have the same protection you have at work.
For those of you on Microsoft Authenticator and getting push notifications to approve sign-ins on your email and Microsoft online services, congratulations! You’ve just added another layer of security to your account. However – a word of advice: if you get a prompt on your phone to approve a sign-in to your account and you aren’t getting a prompt at your computer – please don’t blindly hit approve.
This can legitimately happen if your computer is on and you aren’t sitting in front of it – but it can wait until you’re back in front of it to verify it’s really you that prompted that authentication popup. What you never want to do is “approve” someone else that has your password to get into your account. Only hit approve when you know it’s you that’s doing the asking.
If you aren’t on MFA yet – we’ll be getting around to you soon.
As a reminder to what we advised last month, we’re putting a stop to SpireTech support for Win 7 machines on July 1st. Congratulations to those of you that have successfully eradicated these machines from your networks. However – in a review today, we see that approximately 10% of machines are still running Win 7. We’ve now got 30 days to get rid of the rest of them. While we don’t want to create unnecessary hardship for clients that may be stressed due to COVID-19, we still need clients to make an effort to replace the remaining systems.
Win 7 machines can be slow, insecure, and time-consuming to support. If your network gets breached due to outdated software, or you call us for support on a Win 7 system, we reserve the right to invoice for time beyond 15 minutes of support. Read more...
SpireTech Managed Services clients are now able to purchase a security essentials add-on for Microsoft 365 offered by SpireTech. This add-on, based on powershell and services running in Microsoft Azure, enables additional security features designed to continuously enhance your security on Microsoft 365. These features do not require additional Microsoft licensing to function.
Real time location monitoringWe monitor the login locations for every sign in, and alert on activities outside of expected regions.
External forward monitoringWe monitor automatic forwarding rules. A common tactic employed by hackers to exfiltrate data.
Mailbox auditingLogs actions taken by users in their and other’s mailboxes.
M365 License trackerGet notified every time a license is added or removed from your account, and receive a monthly report of all licenses, use, and assignments.
Email Spoofing ProtectionGet a warning when an external user attempts to impersonate any internal user, including managers.
Monthly Security ReportA detailed report of several key system and security aspects of your M365 tenant. A necessity for regulated industries, and great peace of mind for everyone else.