Fire in a trash dumpster located in the parking lot caused damage to the electrical system which controls our generators. Core electrical and network connectivity remained up during the fire. Repairs needed to address all damage are underway. We will post...
SpireTech Company News and Tips
SpireTech has made the 2017 MSP Mentor MSP501 List
10th Annual MSP 501 Ranking and Study Identifies World’s Most Progressive MSPs in Information Technology SpireTech ranks among the world’s most progressive 501 Managed Service Providers (MSPs), according to MSPmentor’s 10th-annual MSP 501 Worldwide Company Rankings....
See what SpireTech has been doing!
Within the last month SpireTech has hit several major milestones in providing superior solutions to our customers. We have earned our Microsoft Silver CSP status, and earned our SMB Cloud Competency. What does this mean for our customers? Read about each of these...
Warning: New Petya ransomware outbreak similar to WannaCry is spreading worldwide
A new ransomware attack called Petya, PetyaWrap, or GoldenEye began spreading worldwide on June 27th, and it looks similar to the WannaCry outbreak in May. It targets Microsoft Windows operating systems and so far reports show that all systems from XP to Windows 10...
10 easy-to-use online collaboration tools
used with permission from HP Technology at Work Is your team having a communications breakdown? Or maybe just leaning too heavily on endless email threads? From workflow management apps to all-in-one collaboration tools, here are some of the many services available to...
Engage your customers with content – 6 tips for small businesses
used with permission from Microsoft US Small and Midsize Business Blog A few years ago, a startup called Groove that makes helpdesk software found itself just months from running out of money. The founders did something unusual for businesspeople in that situation:...
Windows 10 Tip: Customize Your Start Menu
The Windows 10 Start menu has a new look from previous versions. Specifically, it uses tiles when pinning your favorite apps to the Start menu for quick access. Here, we’ll explain how you can customize your Start menu: pinning and removing apps from the Start menu...
6 steps to securing your email
used with permission from HP Technology at Work Is your company's email providing a tempting route for cyber criminals to attack your business? Hackers continue to target businesses with phishing attacks. Once opened, these malicious email messages can hijack an...
Scammers are not “friends” to small business owners
used with permission from the FTC, by Rosario Méndez Scammers try to contact people in many ways. They call, email, put ads online, send messages on social media and more. If you own a small business, they’re trying to contact you, too. Lately we’ve been hearing about...
Breaking down silos – tools for better communication and collaboration
used with permission from Microsoft Office Blogs Today’s workforce is spread across more locations than ever before: 37 percent of workers telecommuted to some degree in 2015. Companies occupy multiple locations, and business partnerships span the globe. In...