Twitter’s new dashboard app for SMBs

Fishes are known to travel together in schools. They do so as a defense mechanism against predators or as a means to find a mate. Rarely do we see a fish making its way through the ocean unaccompanied. Schools of fish are the Twitter equivalent of celebrities or public figures, whereby lone guppies are SMBs […]

Best CRM Software Options for 2016

If genie lamps were out of stock before you could place an order for one, the next best thing to manage and grow your small- and medium-sized business lies in CRM. Short for customer relationship management, a real difference is possible, with the right software of course. With the numerous options out there, finding the […]

Why You Should Avoid Using A Debit Card When Shopping Online

If you shop online (and these days, who doesn’t?), you’ll want to make sure you use a credit card instead of a debit card to protect yourself from online scams and rip offs. The biggest advantage credit cards offer is a buffer for payment. By law, your maximum loss if your credit card number is stolen is $50, and most credit card companies and banks will cover the entire cost.

Are You Making These 3 Common And Costly Mistakes With Your Online Data Backups?

Offsite backups have been touted in the past few years as the answer to everyone’s bad habit of not doing backups. Once signed up for an online service it’s easy to ‘set it and forget it;’ but too many business owners don’t know what they are buying and end up paying a lot more than they should. They also end up shocked when they discover they weren’t backing up the right files or that they can’t restore the files as quickly as they had hoped.

School Is Back In Session: How To Keep Your Kids Safe Online

Now that school is back in, thousands of children will be surfing the Internet to conduct research, chat with new school mates, and complete homework assignments.

Although the Internet provides a tremendous learning tool for children, left unchecked it can also expose them to inappropriate material and unscrupulous individuals looking to exploit innocent children.

4 Social engineering scams to watch out for

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information. […]

How To Back Up Your Smartphone

You regularly back up your computers (or at least you should), but do you do the same with your smartphone? Given the massive amounts of contact information, photos, videos and other data we all carry around on smartphones, it's critical to back them up or risk losing all that data forever.

Arrange meetings with Microsoft FindTime

While an impressive arsenal of weapons can help you win a battle, you need diligence, perseverance and sacrifice to win the war. But when that war is waged in the arena of calendar management, you’re dealing with a whole other monster. When scheduling meetings, uncontrollable factors like varying schedules and department-specific time constraints mean that […]

Regin – how bad is it?

Spend even a small amount of time looking at the various massive malware threats out there and you will find that security experts are usually able to figure out who developed it, the intended targets, and where it is most prevalent. In early November, news broke about a mystery security threat called Regin that has been […]

Investing in 3 main IT areas

IT is in a near constant state of evolution, largely because of the sheer number of technology-based systems and products released on a weekly basis. This fast-paced development has led to the creation of three major IT areas. It is essential that companies invest in these three areas if they want their business to succeed.