Keep your Dropbox secure

The next time you visit Dropbox.com, you may be asked to create a new password. Why? Back in 2012 the cloud storage firm was hacked, and while it thought only email addresses had been stolen, new evidence has come to ...

Parental Controls: Keeping Kids Safe

Are you a parent looking for a way to protect your children on their mobile devices? There are a number of options available, from built-in controls on Android and Apple devices, to carrier specific parental controls from Verizon, Sprint, AT&T ...

Twitter reveals new SMB dashboard app

The ocean has a strange way of making you feel so small; so does a Twitter account with virtually no followers. It does become quite hard for your small- to medium-sized business to establish a strong online presence when they ...

Best Options for CRM Software in 2016

As the saying goes, “absence makes the heart grow fonder.” If oceans were to separate you from your loved ones, what would you do? Would you communicate as much as you used to? Would you still check in from time ...

Don’t let hackers fool you with these tricks

According to several reports, the volume of malicious cyber attacks have increased since the beginning of the Rio Olympics. And even though our devices have the latest network security systems, hackers have a cunning trick up their sleeves -- social ...

Schedule meetings with Microsoft FindTime

The art of organizing a meeting is much like chess. Each player has different possible moves, or availabilities; and it's up to you to strategize which pieces to move where, or which events to schedule (or reschedule) when. The objective ...

6 tips for improving your SMB’s Facebook page

Although some view Facebook as a strictly social platform reserved for selfies and political rants, its $350+ billion market value screams otherwise. While it isn’t something you should be shoveling money into, it probably is a sales avenue you’re neglecting. ...

Free decryption tools fight ransomware

Similar to the shakedowns you see in mob movies where innocent shop owners are forced to pay “protection money,” deploying ransomware is a means of extortion. Computer hackers install it on your network to seize control of your company’s precious ...

7 Security Risks of Consumer-Grade File Sync Services

Consumer-grade file sync solutions (referred to as CGFS solutions) pose many challenges to businesses that care about control and visibility over company data. Below are seven of the biggest risks that these solutions pose in a business environment. Data theft ...

5 ways to make tech trends work for you

What tech fads has your SMB recently written off as silly and not worth your time? 3D printing, internet of things…Pokémon GO? Juvenile as they may seem at first, these trends helped to make a lot of businesses a lot ...