7 Security Risks of Consumer-Grade File Sync Services

Consumer-grade file sync solutions (referred to as CGFS solutions) pose many challenges to businesses that care about control and visibility over company data. Below are seven of the biggest risks that these solutions pose in a business environment. Data theft ...

5 ways to make tech trends work for you

What tech fads has your SMB recently written off as silly and not worth your time? 3D printing, internet of things…Pokémon GO? Juvenile as they may seem at first, these trends helped to make a lot of businesses a lot ...

Data in, buzzword out

One of your business’s most valuable assets is data, and ensuring its safety should be a top priority for your IT department. But what of the fact that there are so many different types of data nowadays? It seems like ...

5 Ways To Spot A Social Engineering Attack

“I’m not going to make payroll – we’re going to close our doors as a result of the fraud.” Unfortunately, that statement is becoming more common among smaller businesses, according to Mitchell Thompson, head of an FBI financial cybercrimes task ...

5 security measures made easy

Let’s face it, keeping yourself free from online threats can be a pain: using different passwords for every site, changing them every three months, using advanced encryption, the list goes on and on. You either end up paranoid of being ...

So what’s new in SEO and social media?

When it comes to technology news, breakthroughs, innovations, and what-to-do’s, we’ve always got our eyes peeled for the latest and greatest. Paying close attention to what’s trending is critical not only to our success, but to that of our clients ...

WordPress 4.5.3 patches security vulnerabilities

WordPress is an amazing open source platform that is favored by individuals and business users worldwide due to its ease of use, simplicity and flexibility. However, given that it is the most widely used content management system, it is also ...

Why your company needs to be on Instagram

It's astounding how celebrities manage to amass millions of followers and gain thousands of likes for posting a photo of their shadow. Companies of all sizes would go crazy for that kind of exposure, but rarely do their wishes get ...

Tools for online reputation marketing

Like the Loch Ness Monster, reputation marketing has long been considered a figure that is shrouded in mystery. Shai Aharony from Redboot Online sums it up as "tools that allow you to analyze, track, monitor and engage online activity, giving ...

Game Over: NBA team losses valuable data

Good cyber security, much like the best NBA defenses, must be strong and able to stop threats from every which way. For the Milwaukee Bucks, their on-court and cyber security defense could both use a little practice. Yahoo! Sports reported ...