IG Stories: redefining online marketing
Since it’s inception in 2010, Instagram has come a long way from just double-tapping. The photo-sharing application recently announced its plan to experiment with video ads via Instagram Stories. Give...
View ArticleG Suite vs. Office 365
Google and Microsoft have both set impressive milestones in the tech industry. These industry giants continually roll out innovative solutions that simplify the lives of users around the world,...
View ArticleWhat exactly is preventive cyber-security?
There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches...
View ArticleThe right social media platforms for SMBs
Social media marketing is tricky, to say the least. It’s difficult to allocate the resources that create the desired effect, especially when so many platforms are available. Facebook might be the...
View ArticleAdvice from a failed disaster recovery audit
We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is...
View ArticleIs fileless malware a threat to you?
There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the...
View ArticleHow to use Snapchat for your business
A growing number of small- and medium-sized businesses are turning to social media to help facilitate growth. The reasons are obvious, social media is easy-to-use and capable of reaching an enormous...
View ArticleWhat are order management systems?
Adding value to your organization is very different than it was a few decades ago. Whereas business owners previously sought more tangible boosts like equipment and staff, cloud technology has totally...
View ArticleSome ransomware strains are free to decrypt
Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from your business. Before you even consider...
View ArticleIs the government really spying on you?
Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim that...
View ArticleBenefits of social media policy reviews
Does your business have a social media policy? If so, when was the last time you updated it? If you're taking too long to answer these questions, that isn’t a good sign. Because you should be...
View ArticleWhy you need to back up your mobile devices
There was a time when mobile phones were used exclusively for calling and texting. Now, they can do so much more. Regardless of your level of tolerance or skill for managing documents in such a small...
View ArticleThe phishing craze that’s blindsiding users
Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before...
View ArticleWhat’s involved in replacing/upgrading the hard drive?
Have you ever wondered what the inside of your iMac looks like or what's involved in replacing/upgrading the hard drive? Well now you know! Great work by Martin Osborne. Upgrading your Hard Drive to...
View ArticleUgly websites cost your business big time
Good things come to those who wait, and this is especially true for small- and medium-sized businesses that plan on creating an eCommerce website. According to Vistaprint's study on 1,800 consumers, 42...
View ArticleMake your SMB stand out on social media
To truly make an impression on consumers, small- and medium-sized businesses are pulling out all the stops. Standing out from your competitors could increase your chances of earning revenue. Many SMBs...
View ArticleThe most advanced Gmail phishing scam yet
As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly trusting humans to do their dirty work for them. Known as social...
View ArticleHow to defend against WannaCry
Both businesses and individuals across dozens of countries are scrambling to fix their computer systems after a ransomware, named WannaCry, caused major disruptions earlier this month. Like most...
View ArticleWannaCry: A historic cyberattack
No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a...
View ArticleHurricane season DR tips
The chances of your business being hit by a hurricane are slim. But this year, the odds are actually alarming -- the National Oceanic and Atmospheric Administration (NOAA) predicts up to four unusually...
View Article