Blog

Why you need to back up your mobile devices

April 20th, 2017
Why you need to back up your mobile devices

There was a time when mobile phones were used exclusively for calling and texting. Now, they can do so much more. Regardless of your level of tolerance or skill for managing documents in such a small gadget, mobile devices allow you to send and receive email, download and upload media files, store data, and even close business deals.

Benefits of social media policy reviews

April 10th, 2017
Benefits of social media policy reviews

Does your business have a social media policy? If so, when was the last time you updated it? If you’re taking too long to answer these questions, that isn’t a good sign. Because you should be conducting regular reviews, at least annually. You’d enjoy innumerable benefits, and deter your employees from obsessing over Snapchat filters in the process.

Is the government really spying on you?

April 6th, 2017
Is the government really spying on you?

Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim that the vast majority of these efforts took place via smartphones, messaging apps and.

Some ransomware strains are free to decrypt

March 22nd, 2017
Some ransomware strains are free to decrypt

Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is whether your ransomware infection already has a free cure.

What are order management systems?

March 17th, 2017
What are order management systems?

Adding value to your organization is very different than it was a few decades ago. Whereas business owners previously sought more tangible boosts like equipment and staff, cloud technology has totally changed the game. Now, a single piece of software is all it takes to totally revolutionize your fulfillment and shipping process.

How to use Snapchat for your business

March 13th, 2017
How to use Snapchat for your business

A growing number of small- and medium-sized businesses are turning to social media to help facilitate growth. The reasons are obvious, social media is easy-to-use and capable of reaching an enormous amount of users. That being said, you might be missing out on one of the fastest growing platforms available: Snapchat.

Is fileless malware a threat to you?

March 3rd, 2017
Is fileless malware a threat to you?

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger.

Advice from a failed disaster recovery audit

February 28th, 2017
Advice from a failed disaster recovery audit

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways.

The right social media platforms for SMBs

February 24th, 2017
The right social media platforms for SMBs

Social media marketing is tricky, to say the least. It’s difficult to allocate the resources that create the desired effect, especially when so many platforms are available. Facebook might be the biggest name in the industry, but that doesn’t mean it will suit your organization.

What exactly is preventive cyber-security?

February 15th, 2017
What exactly is preventive cyber-security?

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events.