- All
- Business
- Business Continuity
- Security
- Social Media
New phishing scam targets Office 365 users
With more than 100 million monthly active subscribers, Office 365 has attracted the attention of hackers who’ve revamped ...
Read More Is your business ready for hurricane season?
In late August 2017, Hurricane Harvey caused widespread power outages and floods across Texas and certain parts of ...
Read More Facebook faces devious adware
When you receive an email from an unfamiliar source urging you to click on a link or download ...
Read More New Locky ransomware: what you need to know
In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, ...
Read More How Amazon AppStream 2.0 can help businesses
Today’s workforce is no longer confined to office walls. People work from home, while they’re commuting to and ...
Read More Black and white: Not all hackers are bad
When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But ...
Read More CRM tips and tricks for beginners
Customer relationship management (CRM) software is essential for every marketing, sales, and customer service department. It allows you ...
Read More How to create engaging content
With 4.75 billion pieces of content shared on Facebook and 500 million tweets shared every day, harnessing crucial ...
Read More What you need to know about malware
You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of ...
Read More Google launches new Backup and Sync app
Employees don’t usually prioritize managing files and photos because they can be tedious and time-consuming. Those who have ...
Read More Why Nyetya is more threatening than WannaCry
The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to ...
Read More Automate mundane emails to get more done
Everyone wishes there were more minutes in a day. Between repetitive emails and seemingly endless meetings, it’s hard ...
Read More Four Facebook features for your business
Facebook has numerous built-in features to help small- and medium-sized businesses thrive. But chances are that most business ...
Read More Wikileaks details router vulnerabilities
When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just ...
Read More Microsoft Power BI and Office 365 analytics
As machine learning, digital storage, and analytics software get more advanced, data is becoming more valuable than ever. ...
Read More Marketing your SMB with Pinterest
Last October, Pinterest launched its first paid advertising service, “Promoted Pins,” which is geared toward large enterprises. Recently, ...
Read More Basic PC fixes are costing you money
When your employees seek your IT security staff’s help to fix their personal computer (PC) problems, it’s often ...
Read More Hurricane season DR tips
The chances of your business being hit by a hurricane are slim. But this year, the odds are ...
Read More WannaCry: A historic cyberattack
No one can escape the news of WannaCry. The IT industry has been covering this type of malware ...
Read More How to defend against WannaCry
Both businesses and individuals across dozens of countries are scrambling to fix their computer systems after a ransomware, ...
Read More The most advanced Gmail phishing scam yet
As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to ...
Read More Make your SMB stand out on social media
To truly make an impression on consumers, small- and medium-sized businesses are pulling out all the stops. Standing ...
Read More Ugly websites cost your business big time
Good things come to those who wait, and this is especially true for small- and medium-sized businesses that ...
Read More The phishing craze that’s blindsiding users
Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy ...
Read More Why you need to back up your mobile devices
There was a time when mobile phones were used exclusively for calling and texting. Now, they can do ...
Read More Benefits of social media policy reviews
Does your business have a social media policy? If so, when was the last time you updated it? ...
Read More Is the government really spying on you?
Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by ...
Read More Some ransomware strains are free to decrypt
Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up ...
Read More What are order management systems?
Adding value to your organization is very different than it was a few decades ago. Whereas business owners ...
Read More How to use Snapchat for your business
A growing number of small- and medium-sized businesses are turning to social media to help facilitate growth. The ...
Read More Is fileless malware a threat to you?
There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading ...
Read More Advice from a failed disaster recovery audit
We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world ...
Read More The right social media platforms for SMBs
Social media marketing is tricky, to say the least. It’s difficult to allocate the resources that create the ...
Read More What exactly is preventive cyber-security?
There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses ...
Read More G Suite vs. Office 365
Google and Microsoft have both set impressive milestones in the tech industry. These industry giants continually roll out ...
Read More IG Stories: redefining online marketing
Since it’s inception in 2010, Instagram has come a long way from just double-tapping. The photo-sharing application recently ...
Read More Browsers leak sensitive info to hackers
The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to ...
Read More Why your business needs CRM
The right technology investment can lead to business success. With customer relationship management (CRM) software at the helm ...
Read More Cyber security and managed services
Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business ...
Read More Why consider disaster recovery for 2017
The new year is well upon us, and with it comes an equally new IT budget. Judging by ...
Read More Facebook’s group voice calling
“What’s your Facebook name?” is not a question you’re often asked when someone needs your contact details. In ...
Read More Ransomware demands more victims for freedom
Popcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up ...
Read More AWS to launch “Glue” service
Many businesses and enterprises have long struggled with the drudgery and difficulty that is data analysis -- especially ...
Read More Predicting cyber-threats in 2017
As 2017 rolls in, the threat of more formidable cyber attacks looms large. Hackers and the cyber police ...
Read More 5 tips to turn Instagram followers into buyers
Did you know that your thousands of Instagram followers are a goldmine for potential sales? Yes, they are, ...
Read More Using automation in SMB marketing
One of the biggest innovations in business and technology is marketing automation. Previously reserved for well-funded enterprises, marketing ...
Read More Five tips to avoid a security breach
If you’ve read this blog before, you already know security is paramount to the success of any small ...
Read More Prioritizing data backups with analytics
The prevalence of digital data has become an integral part of life and business in modern times. Staggering ...
Read More Young workers are more gullible to tech scams
The old cold-call scam is still a popular way for fraudsters to dupe people out of their money. ...
Read More Grow sales with these social media options
Every company wants to get more business out of social media. But to most small- and medium-sized businesses, ...
Read More BI Technology: Budgeting for the New Year
The use of Business Intelligence technology in making business decisions is a relatively new small business trend. BI ...
Read More 2 types of identity verification, explained
Cyber security is becoming more and more important in an increasingly digital age. While many people and businesses ...
Read More How web monitoring increases productivity
The internet is undoubtedly one of the most powerful tools for improving business productivity. But it’s also a ...
Read More Facebook releases enterprise messaging app
Facebook is constantly working to improve communication between different parties. What started as a means to communicate socially ...
Read More Social engineering and cyber security
Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, ...
Read More How VR helps with business growth
Most people tend to think that the concept of virtual reality has a place with The Jetsons family, ...
Read More 9 essential cybersecurity phrases
As with all technology, trendy phrases come and go with the passing of every IT conference and newly ...
Read More Improve networking with LinkedIn Alumni
How many times have you heard the saying “It’s not about what you do but who you know”? ...
Read More 4 Lessons to learn from Delta’s DR failure
Delta is paying big for the IT outage that occurred last month: millions of dollars in damages, 2300 ...
Read More Reset your Dropbox password
Remember in 2012 when Dropbox’s data, which contained details of around two-thirds of its customers, were leaked? At ...
Read More Twitter’s new dashboard app for SMBs
Fishes are known to travel together in schools. They do so as a defense mechanism against predators or ...
Read More Best CRM Software Options for 2016
If genie lamps were out of stock before you could place an order for one, the next best ...
Read More 4 Social engineering scams to watch out for
Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies ...
Read More Arrange meetings with Microsoft FindTime
While an impressive arsenal of weapons can help you win a battle, you need diligence, perseverance and sacrifice ...
Read More SMBs on Facebook: 6 tips
Facebook’s most recent monthly active users numbered over 1.7 billion. Billion, with a ‘b.’ Since creating and managing ...
Read More Set your ransomed files free, for free
In computers, as in war, encryption is a way of encoding sensitive information so only authorized parties can ...
Read More 5 tips for cashing in on tech trends
More money on less investment, that’s the dream, right? Well, counterintuitive as it may seem, flash-in-the-pan tech fads ...
Read More Do you speak “Data”?
Quick, what’s the most important thing about your business’s precious data? Besides knowing how to back it up ...
Read More 5 simple but manageable security measures
Don\'t be put off by the tech jargon of security experts you find in forums and self-help books. ...
Read More 5 top trends in SEO and social media
If you’re like us, you’ve always got a finger to the wind when it comes to search engine ...
Read More WordPress 4.5.3 fixes several security bugs
WordPress is one of the most popular and reliable content management systems on the market, and for this ...
Read More The benefits of Instagram for your company
Out of all the numerous social media platforms, Instagram is playing in the big leagues with over 400 ...
Read More 10 tools for efficient reputation marketing
In today’s modern age, the speed in which your reputation can change almost as fast as the speed ...
Read More Spoofed email takes down NBA team
The NBA Finals may now be over but for one team, the losses keep coming. Yahoo! Sports reported ...
Read More Build an Online Community for your Business
The word ‘Community’ is derived from the Latin term communitas meaning ‘things shared by many or all’, which ...
Read More Ransomware adopting self-replication
Although some may have hoped that the threat of ransomware was on the decline, the reality is that ...
Read More How to market your SMB on Facebook for free
We all know you can buy ad space on Facebook. And while ads on the world’s largest social ...
Read More 6 ways to use live video to reach customers
Not long ago, uploading a video to the internet was still a new and novel concept, but now ...
Read More Is your continuity plan doomed to fail?
Just because your IT provider has a plethora of awards and certifications under its belt doesn\'t mean that ...
Read More New security flaw in popular image uploader
ImageMagick, one of the internet’s most widely used image processing services, is susceptible to attacks that may put ...
Read More Get more retweets with these Twitter tactics
Are your tweets not getting enough exposure? With so many other social media campaigns out there, it can ...
Read More The age-old marketing tool you’ve forgotten
From free information products such as ebooks to brochures and email campaigns, today’s marketers have a wealth of ...
Read More Different types of hackers defined
Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and ...
Read More How to get 500+ LinkedIn connections
500+ LinkedIn connections can open doors. It can lead to more business, new clients, and provide social proof ...
Read More How to best utilize mobile tech for staff
Love it or hate it, mobile technology in the workplace is here to stay. While more and more ...
Read More How is BYOD a security risk?
Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with ...
Read More Using Facebook emoticons to your advantage
Your news feed is about to get a lot more expressive, thanks to Facebook reactions. Aside from ‘Liking’ ...
Read More Technology ROI 101
Your technology needs to produce a return on investment. If it doesn’t, you’re wasting you and your staff’s ...
Read More How to find out if your computer has a virus
Your computer has been acting up a lot lately. It keeps crashing, it’s slow and, to top it ...
Read More 3 Disaster Recovery myths
Disaster Recovery ain’t what it used to be. Long gone are the days where a DR solution cost ...
Read More Monitoring employees online. Is it right?
Whether or not to monitor your employees\' computers can be a tricky decision. While part of you may ...
Read More Get ahead in social media with these 10 tools
As a small business owner, you only have so many hours in the day, and managing your social ...
Read More BI is for small businesses too
Business Intelligence (BI) has conventionally been the preserve of big business, given the need for specialist knowledge meant ...
Read More Cyber threats and the finance sector
The financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks ...
Read More 4 ways to manage your online image
Not only has the 21st Century brought about vast technological advances, it has also enabled new ways for ...
Read More How to be more productive in life and work
Between your customers, vendors, employees and other moving parts of your organization, it can be difficult to find ...
Read More How to use LinkedIn to create business value
LinkedIn is a highly useful site, but many small businesses simply don\'t make the most of it. The ...
Read More IT Security Policies you need to implement
Most business owners have an employee handbook. But when it comes to the online security of their business, ...
Read More BCP strategies to keep your business open
Whether your business is hit with a brief power outage or an extreme weather disaster, any kind of ...
Read More The Importance of Disaster Recovery
Most business owners don’t normally think they will be a victim of a natural disaster...not until an unforeseen ...
Read More