Blog

The 5 Most Dangerous Pieces Of Information To Put In An E-mail  

In the book Spam Nation, investigative journalist and cybersecurity expert Brian Krebs revealed the single most effective way cybercrime rings gain access to your bank account, credit cards and identity.  Ready for it?   E-mail.

Whether it’s opening an attachment infected by a virus, or a phishing scam where you unknowingly give up your login to a critical web site, e-mail still remains the most popular and reliable way digital thieves can rob you blind, steal your identity and wreak havoc on your network.

How To Know When An Employee Is About To Quit

There’s nothing quite as devastating as losing a key employee, especially if they give you no warning or notice.  Often they’ll give you subtle signs such as a lackadaisical approach to work, arriving and leaving on time, not a minute sooner or later, long lunches or suddenly having several appointments at the beginning or the end of the workday.

3 “Gotchas” Most IT Pros Won’t Tell You When Selling You Their Cloud Solution  

Are you using any cloud applications to store data?  Then listen up! There are a few “gotchas” you need to know about 3rd-party cloud apps that most sales reps will NEVER tell you.

They aren’t responsible for keeping a backup of your data. If you read the small print of your contract, you’ll see that in every way possible, your cloud provider is NOT responsible for data loss or backups – even if it’s their fault.

How To Make Yourself ‘Invisible’ To Hackers

There’s an old joke about two men hiking in the woods when they come across a big, grumpy black bear. Scared silly, one of the guys starts to run but notices his buddy stopped, bent-over, changing his shoes.  He shouts to him, “Dude! What are you doing?!?!  Why aren’t you running?” to which his friend replies, “I’m changing my shoes because I don’t need to outrun the bear – I only need to outrun YOU.”

This is a perfect analogy for what’s going on in small businesses: the “slow,” easy targets are getting nailed by fast-growing cybercrime rings that are getting more sophisticated and aggressive in attacking small businesses.

Yahoo Is Shutting Down Telecommuting – Should You?     

The recent decision by Yahoo CEO Marissa Mayer to stop telecommuting has cast a negative light on this practice. After checking the company’s VPN log to see how many remote employees were logging in, she didn’t like what she saw. Effective June 2015, telecommuting is no longer an acceptable practice at Yahoo.

Pick-Up Lines Are Important for Business

In the world of dating, a successful “pickup line” can make or break any chance of getting to strike up a conversation with someone you would like to meet. Below are a few examples of what some people thought were great "pickup lines."

“I'm not a photographer, but I can picture me and you together.

Is Google The Computer From Star Trek?

If you’ve ever seen a Star Trek episode, you’ll know that “computer” always knew the answer to whatever the commander needed to know to run the starship, do battles with aliens, and it even made tea…Earl Grey.  In business today, Google has taken on the role of answering questions and providing information.

Do I Need To Back Up Data That’s Already In The Cloud?

The computing world is forever changing.  Over the last 15 years, SaaS (software as a service) providers have offered the convenience of data backup for your cloud applications such as CRM systems, SalesForce, Google Apps and Microsoft 365.  The business question is, if I’m already working with a SaaS provider and my data is already “in” the cloud, do I really need to back up my data to another cloud?  After all, isn’t the SaaS provider doing that for me?

Well, yes and no.