Blog

February 24th, 2017

170px_shutterstock_321247400The first thing that comes to mind when you think of social media is Facebook and for good reason. Not only does it boast the most users, but it also has the biggest reach and cultural impact. Since there is no one-size-fits-all social media platform, it’s imperative for small- and medium-sized businesses to examine their options before making an investment.
Read more.

Topic Social Media
February 15th, 2017

2017February15_Security_BShopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content. But one thing does need clarification: What exactly are “proactive cyber-security” measures?

Understand the threats you’re facing

Before any small- or medium-sized business can work toward preventing cyber-attacks, everyone involved needs to know exactly what they’re fighting against. Whether you’re working with in-house IT staff or an outsourced provider, you should review what types of attack vectors are most common in your industry. Ideally, your team would do this a few times a year.

Reevaluate what it is you’re protecting

Now that you have a list of the biggest threats to your organization, you need to take stock of how each one threatens the various cogs of your network. Map out every device that connects to the internet, what services are currently protecting those devices, and what type of data they have access to (regulated, mission-critical, low-importance, etc.).

Create a baseline of protection

By reviewing current trends in the cyber-security field, alongside an audit of your current technology framework, you can begin to get a clearer picture of how you want to prioritize your preventative measure versus your reactive measures.
Read more.
Topic Security
February 10th, 2017

2017February10_Business_BWith our busy schedules, we all could use more time to ourselves and loved ones. Getting back home in time for a real meal is now a luxury for many. Thanks to productivity tools like Google’s G Suite and Microsoft’s Office 365, we’re able to regain some of our lost time. But unless money is no obstacle, you need to choose one over the other. So, should you go for G Suite or Office 365? We’ll address all crucial factors below.
Read more.

Topic Business
February 6th, 2017

2017February6_SocialMedia_BBehind the application is the business, and behind the business is the need to drive revenue. With Stories, Instagram aims to capitalize on their platform and the enormous consumer reach it has -- an impressive following of over 600 million monthly active users. Teaming up with global advertising giants, IG is now dipping its toes into uncharted waters.
Read more.

Topic Social Media
January 27th, 2017

2017January27_Security_BFilling out web forms often seems like an unbearably monotonous obstacle that gets in the way of online shopping, booking a plane ticket, and doing other types of online registration. With many of today’s transactions done online, people have become accustomed to relying on their browsers’ autofill function to save time. But being able to save time from manually filling in your information comes at a price, especially if you’re using Google Chrome, Safari and Apple’s mobile-only Opera.

How do they do it?

By concealing other fields in a sign-up form, users are tricked into thinking they only have to fill out a few fields. The trickery at work is that upon auto-sign up, other fields, which could include your billing address, phone number, credit card number, cvv (the 3-digit code used to validate credit card transactions), and other sensitive information, are auto-filled with the user none the wiser.
Read more.
Topic Security