Posted by on

In response to frequent WordPress hacks, we thought it might be helpful to write about some of the best practices we’ve used to secure WordPress websites. 

  1. Use unique, strong passwords for your login.  One of the techniques hackers use is a stolen password – a password you’ve used elsewhere – to login to your site.  Another technique is to crack a weak password using a bot, repeatedly trying weak password combinations. 
  1. Use Multifactor Authentication at your Wordpress login. Plugins such as “Google Authenticator” will implement this. 
  1. Update your installation at least monthly.  This includes updating WordPress itself, all plugins, and any themes you’ve installed.  
  1. Change your login page.  Bots will try the default login URL to find your login page.  Simply changing this URL to something unique will give them nothing to probe.  Plugins such as “WPS Hide Login” ( can help make this change easily. 
  1. Install a security plugin.  Multiple plugins exist for free that will ban IP addresses that repeatedly try to access your login page, or change the default URL for you.  Caution

Posted by on

You know you need data backup, but when do you need a business continuity solution?

If you’ve been paying attention to the news, you’ll know that massive global ransomware attacks are only growing in scale and frequency. These attacks and other threats and accidents that cripple, ransom, or destroy organizations’ data are a convincing argument for a solid backup solution. Restoring from a data backup is often the only reliable way to recover from these events. Even smaller organizations and businesses know that they need some sort of backup solution now. But when do you need more than a regular data backup?

Types of Data Backup

Roughly speaking, you can think of backup solutions in two flavors. The first type backs up your data (offsite, onsite, and/or in the cloud) and lets you restore it.

The second type does this too, but also provides hardware and software to recover and run your servers or infrastructure in the case of much more catastrophic events.  Read more...

Posted by on

used with permission from HP Technology at Work

What would happen if your company lost your critical business data? Whether your application is email, your website, accounts receivable or any other critical  application, your IT infrastructure is vital to protecting your data—and to your business overall. If critical data is corrupted or lost due to disaster or security breaches, immediate business consequences may result. Decreased profitability, a blemished reputation, or loss of customers may cost you your business. Think of your IT infrastructure as the first line of defense. Arm that defense with technology that is designed to be resilient, highly available, and secure.

Do you need to be more proactive when it comes to securing and protecting your data? Start with understanding your exposure that results from incomplete protection. Consider your infrastructure and the following:

1. Determine if your network security is reliable and pervasive across your business. A secure network should:

  • Ensure mobile devices are securely connected, provisioned, and monitored
  • Provide user access to the network that is easy and connected in a secure manner
  • Authenticate users
  • Monitor network traffic
  • Quickly detect and quarantine threats.

Posted by on


used with permission from the Microsoft Small Business Site

cloud_safeVery few of us would hide our life savings under our mattress with confidence that those funds would remain safe and sound. Financial institutions provide us with a plethora of options for the safekeeping of our money, so it’s crazy to think that we’d opt for hiding all of our cash in the bedroom.

The equivalent of hiding cash under a mattress is actually fairly commonplace in many businesses. Companies frequently store all of their data and information in just one place, leaving them vulnerable to dire consequences should catastrophe, whether physical or technical, occur. Unfortunately, few companies that undergo significant data loss resulting from a disaster can pull things together quickly and effectively enough to survive long-term, further underscoring how imperative it is for businesses to have effective disaster recovery solutions in place.

Businesses have a number of options for preserving business continuity in the wake of disaster and cloud computing stands out as one of the most compelling, cost-effective and easy-to-maintain solutions.  Read more...

Posted by on

SpireTech has been providing Backup solutions with Dell Appassure Replay for over a year now with great success.  A server or workstation crash is one of the worst things that can happen – the best thing assurance you can have is a complete image backup of your system just before the crash.  Replay is in a newer class of backup software that takes disk “images”.

Many of you have used “Ghost” to clone or upgrade hard drives before – Replay takes disk imaging technology and uses it to create true standby machines of your servers and workstations.  Unlike traditional file and folder backup, these disk images can be used to instantly boot a standby server – complete with all of your data, operating system, and installed apps intact.  Time to recovery is greatly reduced with Replay over traditional backup systems.

You can still do traditional file and folder restores, and your backup images can be replicated offsite to SpireTech and other datacenters around the globe.  Read more...

Posted by on

As the technical world takes advantage of new virtual environments and cloud storage, Symantec is noticing and keeping pace. The new product promises better reliability and an interface that is easier to navigate, but more dazzling additions are Backup Exec Cloud, for remote storage, and Backup Exec V-Ray Edition, for virtual machines. It’s great to see these options that had been absent are finally available. This was a noticeable lacking in Symantec’s products when put against up-and-coming competitors and it’s a step in a good direction.

We’ve been using Backup Exec for a very long time and continue to refer it to our clients.  If you would like information about Backup Exec 2012 or SpireTech’s cloud backup solution, please contact us.