Blog

Blog/

How Retargeting and Remarketing Helps Your Advertising

used with permission from SBA.gov., by Anita Campbell

When it comes to online advertising, there’s a powerful technique called “retargeting.” On Google Adwords the approach has another name. Google calls it “remarketing,” but no matter what you call this method, it can be a game changer.

Retargeting enables you to show your ad to someone who has visited your site or seen your product online, even after they have left your site.  You can also use this technique to turn an abandoned shopping cart into a sale. That’s because retargeting allows shoppers to see the product several times again in ads across the Web.

There are other marketing objectives you may want to consider, too. You can set retargeted ads to appear to users who visited your site, encouraging them to come back and register or sign up for your newsletter.

You are not limited to Google AdWords if you want to do retargeting. You can also do […]

By | 2018-02-02T22:56:46+00:00 February 2nd, 2018|Newsletter|Comments Off on How Retargeting and Remarketing Helps Your Advertising

8 in 18

used with permission from HP Tech@Work

8 business trends for 2018 – and beyond

As the calendar rolls over into 2018, we’re looking into the crystal ball at business trends that will shape the upcoming year – and years to come.

Community engagement over social media interaction

Despite the proliferation of smartphones and connected devices, companies are recognizing that social media and virtual connections cannot replace the value of live, in-person interaction with their customers, or the communities they’ve created.

Smart companies will recognize that social media and technology can enhance the value, and effectiveness, of face-to-face interactions, making them even more meaningful.

Generation Z making waves in the talent pool

Generation Z – those born after 1998 – reaching an age where they’re entering the workforce, and their influence on business is starting to be felt. Estimated at nearly 70 million strong, the upper reaches of this group are into college or joining the workforce, and will soon […]

By | 2018-02-02T22:56:36+00:00 February 2nd, 2018|Newsletter|Comments Off on 8 in 18

Boost Cybersecurity with Managed Services

Did you know your organization could be subject to data breach notification laws and possible fines for data breaches and losing sensitive client data? The exact laws and regulations do vary by state and industry, among other factors. But the fact remains that poor cybersecurity can lead to grave consequences, either financial or for your reputation.

Common sense advice is that any organization should establish and maintain a plan for managing cybersecurity risks. This security plans should be informed by applicable laws and regulations.

Are you concerned about the state of your security and your ability to protect your organization’s sensitive information? Managed IT services can help. Managed IT services are the constant remote monitoring of your IT network and technology services, such as:

  • Automatic software updates and security patches for your computers and servers
  • Up-to-date anti-virus, anti-malware, and anti-spam solutions for your devices and email
  • Secure, tested offsite backup and […]
By | 2018-02-02T23:02:20+00:00 February 2nd, 2018|Newsletter|Comments Off on Boost Cybersecurity with Managed Services

Back Where We Belong

In July of 2017 2140 SW Jefferson Street, home of SpireTech, suffered damage from a dumpster fire. While the majority of the building was unharmed, insurance completely remodeled the building to remove the smoke odor. During the renovations,  SpireTech relocated our “people space” to 2130 SW Jefferson St. while while our home of 20+ years was being remodeled.

We are happy to announce that we will be moving back across the parking lot to the 2140 building!  The moving process will be underway Friday, Feb 9th, and Saturday, Feb 10th.  Aside from our physical address all contact information will stay the same.  Helpdesk and phone coverage will continue during business hours while the move is taking place.

We expect to be ready to welcome visitors to our renovated space by Monday February 12th. If you are in the area feel free to stop by and check out our ‘new’ offices!

By | 2018-02-02T22:17:28+00:00 February 2nd, 2018|Newsletter|Comments Off on Back Where We Belong

New Vulnerabilities Disclosed– ‘Meltdown’ and ‘Spectre’

What are they and can they affect you?

These are two computer security vulnerabilities that were publicly disclosed on January 3, 2018.  Due to technical issues involved with modern processors, each of these vulnerabilities pose a potential risk for theft of sensitive user and system data that had previously been believed to be secure.  Both vulnerabilities take advantage of a feature of modern Intel CPU’s called Speculative Execution, this allows the processor to speed up branching operations by starting to execute what it thinks is the most likely outcome before the results have returned. In modern Intel processors this technique is beneficial as it significantly increases execution speed in most workloads. However, Meltdown specifically allows an attacker to exploit Speculative Execution and see the contents of Kernel space memory.  Spectre allows programs to execute code they should not be able to, and view data within other user-space programs. Any system that allows arbitrary code to be executed is potentially vulnerable to these […]

By | 2018-01-11T17:50:10+00:00 January 10th, 2018|Newsletter|Comments Off on New Vulnerabilities Disclosed– ‘Meltdown’ and ‘Spectre’

Inserting a Table of Contents and References in Microsoft Word

If you’re using Styles in your Microsoft Word document, you can insert an automatic Table of Contents with just a few clicks. And if you’ve ever wondered how to insert updatable references like “see page 9 for more”, you’ll learn how to do that as well in this tip.

Use Styles for Speed and Consistency

The first step before you can insert Tables of Contents or page references is to use Styles. You can find these in the Styles groups under the Home tab on the Ribbon. If you want to switch to a different Style set, go to the Document Formatting group under the Design tab.

All you have to do is select your document’s headings, and apply Styles like Heading 1, Heading 2, Heading 3, etc.

Inserting a Table of Contents

A table of contents is automatically […]

By | 2018-01-08T20:28:40+00:00 January 8th, 2018|Newsletter|Comments Off on Inserting a Table of Contents and References in Microsoft Word

Stick with Security: Secure remote access to your network

Ask a business person where their office is located and the likely answer is “everywhere.” They’re working from home, staying in the loop while traveling, and catching up on email between sales calls. For productivity’s sake, many companies give their employees – and perhaps clients or service providers – remote access to their networks. Are you taking steps to ensure those outside entryways into your systems are sensibly defended?

If your business wants to start with security, it’s important to secure remote access to your network. Here are some examples based on FTC investigations, law enforcement actions, and questions that businesses have asked us.

Ensure Endpoint Security.

Your network is only as secure as the least safe device that connects to it – and there’s no guarantee that an employee’s home computer, a client’s laptop, or a service provider’s smartphone meets your standards for security. Before allowing them to access your network remotely, set security ground rules, […]

By | 2018-01-08T20:22:44+00:00 January 8th, 2018|Newsletter|Comments Off on Stick with Security: Secure remote access to your network

Tips to Improve Your Cybersecurity in 2018

2018 is right around the corner, and here are our top five tips for things you can do to improve your cybersecurity in the new year. Cybersecurity has been the most critical issue in 2017, and that’s not going to change. If you haven’t begun addressing your organization’s cybersecurity defense, let’s start now!

#1 Train Your Employees

The best way to improve your IT security is to train your employees on best security practices. Educate them so they can recognize and avoid cyber threats like phishing and scams. Teach them about protecting sensitive information. Humans are the weakest link in your security defense: with a single click in an email they can open the door for hackers. You should have a network firewall, but don’t forget your employees are a firewall too.

#2 Create Security Policies & Enforce Them

Do your employees know what they are expected to do and not do to protect your data? […]

By | 2018-01-08T20:19:18+00:00 January 8th, 2018|Newsletter|Comments Off on Tips to Improve Your Cybersecurity in 2018

Microsoft Windows 10: Update Issues with “Fall Creator”

Microsoft regularly releases annual updates to their current operating system, this year it is known as the Fall Creators update (Build 1709).

As more machines are being updated with this release SpireTech’s support specialists have noticed a trend in calls reporting Windows 10 system instabilities.

Some of the concerns that SpireTech is aware of include:

  • Update causes Remote Desktop (RDP) to stop functioning
  • AutoDesk software becoming unstable after the update and frequently crashing
  • Various printer vendors are working to update drivers to support Microsoft’s changes
  • Microsoft .Net Framework packages have become unstable and seem to be causing software crashes
  • Microsoft Office365 Users have reported being unable to install some other software applications if the Office suite software is running at the time

SpireTech’s VIP Managed Service customers, who have their patches managed by Spire, don’t need to be concerned about these issues as this update patch will be deferred until it can appropriately be applied.

For the […]

By | 2017-12-13T00:35:07+00:00 December 9th, 2017|Newsletter|Comments Off on Microsoft Windows 10: Update Issues with “Fall Creator”

3 Security Advantages of Managed IT Services

Managed IT services, or outsourced remote network management, can help your business in many ways. It’s a cost effective way of having your IT infrastructure monitored and maintained by experts instead of hiring an IT director. Or, it can free up your IT director and IT staff to work on more important projects than daily maintenance. But other than productivity and peace of mind, what are the security benefits of managed IT services?

Here are three security advantages you get with remote network management.

#1 You Stay Updated

Basic managed IT services include running software updates, patches, and upgrades for your servers and/or desktops. Any machines covered by your contract will automatically have updates run on schedule, so you never have to worry about the time it takes to check your update status and apply patches. Instead, updating happens automatically – heading off any cybersecurity attacks that target vulnerabilities between the times when a patch […]

By | 2017-12-09T00:25:47+00:00 December 7th, 2017|Newsletter|Comments Off on 3 Security Advantages of Managed IT Services