Posted by on

SpireTech does not use any SolarWinds software.  However, the longer-term effects of this hack are likely not going to be known for a while – if at all – because SolarWinds was used by many government agencies and larger enterprise companies.

As of this point, we know of no customer-affecting data breaches as a result of this hack.  However, with a hack of this magnitude, it is important to consider the larger supply chain – perhaps even your vendor’s vendors.  For example, Microsoft makes extensive use of contractors.  Microsoft has disclosed they were affected by the SolarWinds hack and there was unauthorized read-only access to their source code repository.  No access to customer data has been reported or disclosed as of this writing.   Read more...


Posted by on
To effectively monitor and manage their client’s systems MSPs (Managed service providers) often establish remote connections to all their client’s networks. Unfortunately, those multiple connections make MSPs a prime target for ransomware and hacking.

Posted by on

Evolved from Emotet and Trickbot malware, Trickboot has the ability to modify your computer’s firmware – basically, the portion of code that lives in chips in your motherboard – to survive even after a complete wipe and reinstall of your hard drive. 

The best defense against this malware is user education – typically, a user is tricked into opening a compromised Word document, usually received via an email attachment or link, and accepting macros. This causes the malware to execute and potentially download other harmful malware to your computer.  Be sure that any attachments you receive are legitimate – even attachments from “trusted” senders could be compromised.  If in doubt, forward to our helpdesk for advice on how to proceed.   Read more...


Posted by on

Over the last two months, we have seen several customers have their WordPress websites hacked.  Hackers installed a plugin or other backdoors and used the sites to send thousands of spam messages – or worse.  All sites were successfully recovered from backup and repaired by our IT Service desk, which is a billable event. 

Our investigation revealed that the hacks were due to sites not being kept up to date with security updates, or poor password management practices.  Read the rest of this month’s articles to discover ways to secure your WordPress website, and Managed WordPress hosting.   Read more...


Posted by on

In response to frequent WordPress hacks, we thought it might be helpful to write about some of the best practices we’ve used to secure WordPress websites. 

  1. Use unique, strong passwords for your login.  One of the techniques hackers use is a stolen password – a password you’ve used elsewhere – to login to your site.  Another technique is to crack a weak password using a bot, repeatedly trying weak password combinations. 
  1. Use Multifactor Authentication at your Wordpress login. Plugins such as “Google Authenticator” will implement this. 
  1. Update your installation at least monthly.  This includes updating WordPress itself, all plugins, and any themes you’ve installed.  
  1. Change your login page.  Bots will try the default login URL to find your login page.  Simply changing this URL to something unique will give them nothing to probe.  Plugins such as “WPS Hide Login” (https://wordpress.org/plugins/wps-hide-login/) can help make this change easily. 
  1. Install a security plugin.  Multiple plugins exist for free that will ban IP addresses that repeatedly try to access your login page, or change the default URL for you.  Caution
  Read more...

Posted by on

We’ve had a few clients ask us about remote worker policies.  We view this as an HR issue with possible legal implications, so you’ll want to seek advice appropriate to your firm.  We’ve all had to relax the standards around eligibility and physical environment during Covid, but the policies around attendance and security still apply.  Here’s some food for thought if you have yet to implement a remote work policy. 

Working Remotely: 

Working from home is a privilege and may be allowed in some circumstances subject to the following guidelines. If your supervisor approves your working from home on a particular day instead of being present in the office, you must comply with the following guidelines:  

  • Eligibility Not all positions are eligible for working remotely. If your position involves frequent or important interaction with other employees or clients, it may not be possible or practical for you to successfully work remotely. If you are unable to work at your normally assigned position and time, working from home must be pre-approved by your direct supervisor.  
  Read more...

Posted by on

M365 has several optional security features that are not turned on by default.  The capabilities vary based on your subscription, but even the most basic subscriptions have features that we can enable.   

For the quickest, easiest, and automatic enforcement of basic security best practices, subscribe to our M365 security essentials pack.  This is software that runs in the cloud to lock down and keep your M365 tenant secure. 

Clients on M365 business premium have additional features available, including conditional access, Azure identity protection, and various flavors of Advanced Threat Protection. 

Contact us to secure your M365 tenant today. 

  Read more...


Posted by on

If you have employees using personal devices to work from home, you should make sure those computers have business-grade anti-virus and patches are being kept up to date.  Remember that we offer support for these secondary devices for only $30/mo, and the price includes Sophos Intercept X anti-virus software.  Please let us know if you’d like us to secure some of these personal devices.   Read more...


Posted by on

Just a quick note to let clients know that if you are still running Windows 7 or 2008 server, we cannot be responsible for the security of your network.  The risk of ransomware is real, and we’ve heard many horror stories of companies that have been breached.  Being able to apply security updates to your computers is one of the key defenses you have against this risk. 

In accordance with our policies, we reserve the right to invoice for technical support of software that does not have vendor support.  As a courtesy, we will extend free support for 15 minutes, after which we will request approval to bill for our time.  We do not wish to impose hardship, but aged software and hardware does require more time to support than modern software, and we must balance this against the need for security.   Read more...


Posted by on

In case you missed it last month, we’ve licensed specialized software that runs in Azure that optionally enables additional security for our clients using Office 365.  The software works to automatically keep security tight, and alert on suspicious logins and emails.  To learn more, please visit: 

  Read more...

1 2 3 7