Small businesses face a daily juggle - say 'yes' to one thing and 'no' to something else. Three common technology areas are often places where businesses choose to go cheap. In today's security climate, that's risky. Here's why.
What if you could charge your car while you were driving down the highway? Or power up your cell phone just by walking around using it? Technology freed from outlets, bricks, cables and adapters that makes us truly mobile? That would really be powerful. And it may be closer than you think.
Don't have a Yahoo! account? You may still have been among the 1 billion whose sensitive information was hacked if you have an account with one of any number of large companies that use Yahoo! to provide email and authentication services.
Planning for unexpected and unlikely is a hard thing. But ask businesses up and down the South Carolina coast how important it is to have an emergency plan. Hurricane, tornado. power outage, ransomware - the disaster may be different, but you need a response.
Recent data breaches, like the Bon Secours exposure of 655,000 records, illustrate a major cyber security problem: It's not enough to have a good handle on your own security - you need to know how your partners and vendors are protecting your data as well.
Nonprofits, regardless of size are a profitable target for hackers. The reliance on volunteers, tighter purse strings, and lesser likelihood of having strong IT support makes them attractive targets. Here's how to even the odds a bit.
61633338 - people, family, charitable organizations and nursing concepts, close-up of two hands holding a family of four
Your business has a 15-65 percent chance of successfully implementing new technology in your business. How can you change that? Here are some ideas.
10503798 - teamwork and leadership with education symbol represented by two human heads shaped with gears with red and gold brain idea made of cogs representing the concept of intellectual communication through technology exchange.
New technology surfaces every day and yet there are some applications we just can't let go of. Even those we really don't like. Why do we keep letting familiarity crush collaboration, productivity and just plain better?
Technology and social media played a pivotal role in the last few weeks of social upheaval, exceeding the boundaries of their original design. When that happens, we are often confronted with the unintended circumstances and unforeseen situations that make us ask: Should we just because we can? Can we stop, if we want to?
The Clinton email investigation does have an important takeaway, but it is not about culpability or politics. Rather it's the inherent risks of our digital behaviors and what we are doing - or not - to change them.
The markets tanked, the Pound Sterling fell off the white cliffs of Dover, but there were some winners in the Brexit vote: Cybercriminals. Their currency of choice - Bitcoin - soared as quickly as the Pound fell.