Anchor Point

Blog

  • All
  • Business
  • Business Continuity
  • Security
  • Social Media

New phishing scam targets Office 365 users

With more than 100 million monthly active subscribers, Office 365 has attracted the attention of hackers who’ve revamped ...
Read More

Is your business ready for hurricane season?

In late August 2017, Hurricane Harvey caused widespread power outages and floods across Texas and certain parts of ...
Read More

Facebook faces devious adware

When you receive an email from an unfamiliar source urging you to click on a link or download ...
Read More

New Locky ransomware: what you need to know

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, ...
Read More

How Amazon AppStream 2.0 can help businesses

Today’s workforce is no longer confined to office walls. People work from home, while they’re commuting to and ...
Read More

Black and white: Not all hackers are bad

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But ...
Read More

CRM tips and tricks for beginners

Customer relationship management (CRM) software is essential for every marketing, sales, and customer service department. It allows you ...
Read More

How to create engaging content

With 4.75 billion pieces of content shared on Facebook and 500 million tweets shared every day, harnessing crucial ...
Read More

What you need to know about malware

You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of ...
Read More

Google launches new Backup and Sync app

Employees don’t usually prioritize managing files and photos because they can be tedious and time-consuming. Those who have ...
Read More

Why Nyetya is more threatening than WannaCry

The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to ...
Read More

Automate mundane emails to get more done

Everyone wishes there were more minutes in a day. Between repetitive emails and seemingly endless meetings, it’s hard ...
Read More

Four Facebook features for your business

Facebook has numerous built-in features to help small- and medium-sized businesses thrive. But chances are that most business ...
Read More

Wikileaks details router vulnerabilities

When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just ...
Read More

Microsoft Power BI and Office 365 analytics

As machine learning, digital storage, and analytics software get more advanced, data is becoming more valuable than ever. ...
Read More

Marketing your SMB with Pinterest

Last October, Pinterest launched its first paid advertising service, “Promoted Pins,” which is geared toward large enterprises. Recently, ...
Read More

Basic PC fixes are costing you money

When your employees seek your IT security staff’s help to fix their personal computer (PC) problems, it’s often ...
Read More

Hurricane season DR tips

The chances of your business being hit by a hurricane are slim. But this year, the odds are ...
Read More

WannaCry: A historic cyberattack

No one can escape the news of WannaCry. The IT industry has been covering this type of malware ...
Read More

How to defend against WannaCry

Both businesses and individuals across dozens of countries are scrambling to fix their computer systems after a ransomware, ...
Read More

The most advanced Gmail phishing scam yet

As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to ...
Read More

Make your SMB stand out on social media

To truly make an impression on consumers, small- and medium-sized businesses are pulling out all the stops. Standing ...
Read More

Ugly websites cost your business big time

Good things come to those who wait, and this is especially true for small- and medium-sized businesses that ...
Read More

The phishing craze that’s blindsiding users

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy ...
Read More

Why you need to back up your mobile devices

There was a time when mobile phones were used exclusively for calling and texting. Now, they can do ...
Read More

Benefits of social media policy reviews

Does your business have a social media policy? If so, when was the last time you updated it? ...
Read More

Is the government really spying on you?

Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by ...
Read More

Some ransomware strains are free to decrypt

Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up ...
Read More

What are order management systems?

Adding value to your organization is very different than it was a few decades ago. Whereas business owners ...
Read More

How to use Snapchat for your business

A growing number of small- and medium-sized businesses are turning to social media to help facilitate growth. The ...
Read More

Is fileless malware a threat to you?

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading ...
Read More

Advice from a failed disaster recovery audit

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world ...
Read More

The right social media platforms for SMBs

Social media marketing is tricky, to say the least. It’s difficult to allocate the resources that create the ...
Read More

What exactly is preventive cyber-security?

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses ...
Read More

G Suite vs. Office 365

Google and Microsoft have both set impressive milestones in the tech industry. These industry giants continually roll out ...
Read More

IG Stories: redefining online marketing

Since it’s inception in 2010, Instagram has come a long way from just double-tapping. The photo-sharing application recently ...
Read More

Browsers leak sensitive info to hackers

The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to ...
Read More

Why your business needs CRM

The right technology investment can lead to business success. With customer relationship management (CRM) software at the helm ...
Read More

Cyber security and managed services

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business ...
Read More

Why consider disaster recovery for 2017

The new year is well upon us, and with it comes an equally new IT budget. Judging by ...
Read More

Facebook’s group voice calling

“What’s your Facebook name?” is not a question you’re often asked when someone needs your contact details. In ...
Read More

Ransomware demands more victims for freedom

Popcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up ...
Read More

AWS to launch “Glue” service

Many businesses and enterprises have long struggled with the drudgery and difficulty that is data analysis -- especially ...
Read More

Predicting cyber-threats in 2017

As 2017 rolls in, the threat of more formidable cyber attacks looms large. Hackers and the cyber police ...
Read More

5 tips to turn Instagram followers into buyers

Did you know that your thousands of Instagram followers are a goldmine for potential sales? Yes, they are, ...
Read More

Using automation in SMB marketing

One of the biggest innovations in business and technology is marketing automation. Previously reserved for well-funded enterprises, marketing ...
Read More

Five tips to avoid a security breach

If you’ve read this blog before, you already know security is paramount to the success of any small ...
Read More

Prioritizing data backups with analytics

The prevalence of digital data has become an integral part of life and business in modern times. Staggering ...
Read More

Young workers are more gullible to tech scams

The old cold-call scam is still a popular way for fraudsters to dupe people out of their money. ...
Read More

Grow sales with these social media options

Every company wants to get more business out of social media. But to most small- and medium-sized businesses, ...
Read More

BI Technology: Budgeting for the New Year

The use of Business Intelligence technology in making business decisions is a relatively new small business trend. BI ...
Read More

2 types of identity verification, explained

Cyber security is becoming more and more important in an increasingly digital age. While many people and businesses ...
Read More

How web monitoring increases productivity

The internet is undoubtedly one of the most powerful tools for improving business productivity. But it’s also a ...
Read More

Facebook releases enterprise messaging app

Facebook is constantly working to improve communication between different parties. What started as a means to communicate socially ...
Read More

Social engineering and cyber security

Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, ...
Read More

How VR helps with business growth

Most people tend to think that the concept of virtual reality has a place with The Jetsons family, ...
Read More

9 essential cybersecurity phrases

As with all technology, trendy phrases come and go with the passing of every IT conference and newly ...
Read More

Improve networking with LinkedIn Alumni

How many times have you heard the saying “It’s not about what you do but who you know”? ...
Read More

4 Lessons to learn from Delta’s DR failure

Delta is paying big for the IT outage that occurred last month: millions of dollars in damages, 2300 ...
Read More

Reset your Dropbox password

Remember in 2012 when Dropbox’s data, which contained details of around two-thirds of its customers, were leaked? At ...
Read More

Twitter’s new dashboard app for SMBs

Fishes are known to travel together in schools. They do so as a defense mechanism against predators or ...
Read More

Best CRM Software Options for 2016

If genie lamps were out of stock before you could place an order for one, the next best ...
Read More

4 Social engineering scams to watch out for

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies ...
Read More

Arrange meetings with Microsoft FindTime

While an impressive arsenal of weapons can help you win a battle, you need diligence, perseverance and sacrifice ...
Read More

SMBs on Facebook: 6 tips

Facebook’s most recent monthly active users numbered over 1.7 billion. Billion, with a ‘b.’ Since creating and managing ...
Read More

Set your ransomed files free, for free

In computers, as in war, encryption is a way of encoding sensitive information so only authorized parties can ...
Read More

5 tips for cashing in on tech trends

More money on less investment, that’s the dream, right? Well, counterintuitive as it may seem, flash-in-the-pan tech fads ...
Read More

Do you speak “Data”?

Quick, what’s the most important thing about your business’s precious data? Besides knowing how to back it up ...
Read More

5 simple but manageable security measures

Don\'t be put off by the tech jargon of security experts you find in forums and self-help books. ...
Read More

5 top trends in SEO and social media

If you’re like us, you’ve always got a finger to the wind when it comes to search engine ...
Read More

WordPress 4.5.3 fixes several security bugs

WordPress is one of the most popular and reliable content management systems on the market, and for this ...
Read More

The benefits of Instagram for your company

Out of all the numerous social media platforms, Instagram is playing in the big leagues with over 400 ...
Read More

10 tools for efficient reputation marketing

In today’s modern age, the speed in which your reputation can change almost as fast as the speed ...
Read More

Spoofed email takes down NBA team

The NBA Finals may now be over but for one team, the losses keep coming. Yahoo! Sports reported ...
Read More

Build an Online Community for your Business

The word ‘Community’ is derived from the Latin term communitas meaning ‘things shared by many or all’, which ...
Read More

Ransomware adopting self-replication

Although some may have hoped that the threat of ransomware was on the decline, the reality is that ...
Read More

How to market your SMB on Facebook for free

We all know you can buy ad space on Facebook. And while ads on the world’s largest social ...
Read More

6 ways to use live video to reach customers

Not long ago, uploading a video to the internet was still a new and novel concept, but now ...
Read More

Is your continuity plan doomed to fail?

Just because your IT provider has a plethora of awards and certifications under its belt doesn\'t mean that ...
Read More

New security flaw in popular image uploader

ImageMagick, one of the internet’s most widely used image processing services, is susceptible to attacks that may put ...
Read More

Get more retweets with these Twitter tactics

Are your tweets not getting enough exposure? With so many other social media campaigns out there, it can ...
Read More

The age-old marketing tool you’ve forgotten

From free information products such as ebooks to brochures and email campaigns, today’s marketers have a wealth of ...
Read More

Different types of hackers defined

Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and ...
Read More

How to get 500+ LinkedIn connections

500+ LinkedIn connections can open doors. It can lead to more business, new clients, and provide social proof ...
Read More

How to best utilize mobile tech for staff

Love it or hate it, mobile technology in the workplace is here to stay. While more and more ...
Read More

How is BYOD a security risk?

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with ...
Read More

Using Facebook emoticons to your advantage

Your news feed is about to get a lot more expressive, thanks to Facebook reactions. Aside from ‘Liking’ ...
Read More

Technology ROI 101

Your technology needs to produce a return on investment. If it doesn’t, you’re wasting you and your staff’s ...
Read More

How to find out if your computer has a virus

Your computer has been acting up a lot lately. It keeps crashing, it’s slow and, to top it ...
Read More

3 Disaster Recovery myths

Disaster Recovery ain’t what it used to be. Long gone are the days where a DR solution cost ...
Read More

Monitoring employees online. Is it right?

Whether or not to monitor your employees\' computers can be a tricky decision. While part of you may ...
Read More

Get ahead in social media with these 10 tools

As a small business owner, you only have so many hours in the day, and managing your social ...
Read More

BI is for small businesses too

Business Intelligence (BI) has conventionally been the preserve of big business, given the need for specialist knowledge meant ...
Read More

Cyber threats and the finance sector

The financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks ...
Read More

4 ways to manage your online image

Not only has the 21st Century brought about vast technological advances, it has also enabled new ways for ...
Read More

How to be more productive in life and work

Between your customers, vendors, employees and other moving parts of your organization, it can be difficult to find ...
Read More

How to use LinkedIn to create business value

LinkedIn is a highly useful site, but many small businesses simply don\'t make the most of it. The ...
Read More

IT Security Policies you need to implement

Most business owners have an employee handbook. But when it comes to the online security of their business, ...
Read More

BCP strategies to keep your business open

Whether your business is hit with a brief power outage or an extreme weather disaster, any kind of ...
Read More

The Importance of Disaster Recovery

Most business owners don’t normally think they will be a victim of a natural disaster...not until an unforeseen ...
Read More

IT support that focuses on you.

Skip to content