Blog

Is your computer infected with malware?

Has your computer been running slow lately? Are you getting a bunch of unwanted pop-ups? Then it’s possible your system’s security has been breached. Being able to identify whether or not your computer is infected with malware will allow you to quickly come up with antivirus solutions to protect your system. This means you’ll be […]

Should you monitor your employees online?

To monitor your employees, or not to monitor, that is the topic of this blog post today. If you’ve ever considered monitoring your staff’s online activities, you may’ve been lost as to whether or not it’s the right decision. So we’ve listed the pros and cons of doing it, and some tips to make it […]

10 Tools to help you get ahead in social media

Social media marketing can be time consuming. You may spend hours upon hours trying to get it right and still see little growth in your followers. So what can you do to be more effective and save time in the process? Here are ten tools that can streamline your social media efforts and even offer […]

Why BI is for everyone

If you’ve managed to convince yourself that only large enterprises have the money to take advantage of Business Intelligence (BI), it’s time to think again. While it’s true that in the past you needed the help of pricey specialists to really delve into BI, these days a range of self-service tools mean that small- and […]

IT security concerns of the finance sector

The time to increase cyber situational awareness and establish better security strategies has never been more opportune. Since 2015, the number of attacks on the financial services sector has increased and shows no signs of letting up. Whether it be extortion or credential-stealing malware, different tactics are utilized to target desired areas. To optimize safety, […]

Event Highlights – Cyber Crime Seminar by Connected Technology, LLC.

Event Highlights – Cyber Crime Seminar by Connected Technology, LLC.

I would like thank everyone for attending yesterday’s Cyber Security breakfast. I hope it was informative and everyone had a chance to build some business relationships. Special thanks to Michael Korten from Cisco for sharing his years of experience in the security field. If you would like a copy of his presentation you can download it from this secure Datto Drive link.

Improve your online image in 4 steps

Reputation and image management has come a long way from being the vapid process it was decades ago. It is now vital to those wishing to find wealth, trustworthiness and entrepreneurial longevity, and nowhere is this more important than on the Internet. With that in mind, here are a few tips to help you establish […]

Be more productive in life and work

If you’re grinding away at your desk, stuck at the office for another late night, wondering when you’ll ever complete that final task on your to-do-list, there is hope: principles that can be applied to make you more productive. These ideas will not only improve the quality of your work and business, but also the […]

How to gain business value from LinkedIn

While there is a lot of information out there about how to gain value from LinkedIn, most of it is aimed at large companies or individuals. Some of this information can be useful, but some of it can cause you to make mistakes that present your business in the wrong light. As an SMB owner, […]