Blog

Pitfalls of business continuity planning

Like all things man-made and otherwise, business continuity plans are not perfect. They too have pitfalls that can result in your business’s failure if not accounted for immediately. Don’t blame it all on the IT guy, as often times the way a system is designed can also have loopholes. Here are a few of the […]

Image uploader security flaw discovered

Unfortunately, we’re confronted with new web security threats every day, and today is no different. Experts have exposed a flaw in ImageMagick, one of the internet’s most commonly used image processors, that could put your site in harm’s way. By learning more about this vulnerability you’ll take the first step toward better protecting your content. […]

28th Annual B2B Tradeshow & Conference

Win our dog on 5/19 @ the 28th Annual B2B Tradeshow & Conference presented by #HIA-LI! Stop by our booth 224 to meet the Fire Department of your Network, the Real Face of Cyber Crime and our favorite Dalmatian!!! Look for us by the 8 foot tall Firewall (Seriously, you won’t be able to miss us… until you are walking away!) See footage from our last event: http://www.

7 Ways to get more retweets

It can be discouraging for any business to post a thoughtful tweet in the morning just to see that it barely has any retweets by the end of the day. Even after hours of compiling the best 140 characters your company can think of, are you still not getting any hits? There are many tricks […]

The effective marketing tool you forgot

When it comes to marketing, it can be tough to determine the most effective strategies. There are so many different ways you can try to lure customers to your brand: a free ebook, email marketing and press releases are few strategies often used. But how do you know what’s most effective? It all comes down […]

4 different types of hackers

Hackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better. Here’s a profile of four […]

How to get 500+ connections on LinkedIn

500+ LinkedIn connections can seem like a lofty goal. You have a business to run, and probably don’t have much time to dedicate to the platform. However, carving out the time to grow your LinkedIn network can prove invaluable as it will provide social proof to yourself or organization and presents the opportunity to connect […]

How to make the most out of your BYOD policy

There’s a lot of talk about BYOD policies these days. While most companies are more concerned with the security risks that go along with bringing your own device, far fewer business owners forget the productivity risks. Believe it or not, a poor BYOD policy (or lack thereof) can actually hurt your staff’s productivity. Here are […]

4 Security risks to consider with BYOD

Taking work home, or practically anywhere else, has never been easier. With personal mobile devices, your employees can access company files wherever they are. Bringing your own device (BYOD) has become a popular strategy for many businesses to conduct work more efficiently and flexibly. But this strategy is not without its problems. BYOD, if not […]

Get the most out of Facebook reactions

Love, Haha, Wow, Sad or Angry. If you’ve been on Facebook recently, you’ve probably noticed that Facebook has finally added five more ways for you to react to a particular post. Many businesses will find this feature important since these new emoticons now provide a way for you to know what users feel about your […]