We’ve been dealing with cybersecurity for enough years now, yet our passwords our still weak, our procedures haven’t caught up with hackers’ skills, and our overall risk is greater. Why aren’t we getting any better at this?
Voting is a lot more secure than you would think if you just followed the antics of the company that provides all voting machines in South Carolina. Whatever your political leanings, there are lessons businesses can learn from how this company has responded to adversity.
Solopreneurs do a lot of things themselves using technology: templated contracts, software-designed pitches, free levels of higher end tools for CRM and other functions. But one thing they really need a professional for is designing logos and collateral. Learn Why.
Cryptocurrencies are geopolitically agnostic. They can be used across borders without being subject to any country’s currency manipulation. They can be held as an investment with all the risks and rewards. Advocates call it the first global currency. Opponents, like Warren Buffet, call it “rat poison squared.” If you’re a geek, it’s just cool.
Facebook just keeps getting in deeper and deeper. Marketing mavens may wonder where their audience will go if Facebook fails; Digital Mavens wonder why we keep giving up our privacy and then wondering where it went.
Coupled with the ever-present onslaught of new data breaches, security vulnerabilities, and data leaks, it’s not unreasonable to think that most of us would have a passing understanding of the social media risk-benefit equation by now. But we might be wrong about that.
The Cambridge Analytica-Facebook connection is complex, deeply flawed, and now, deeply damaging. But there is an important takeaway: Trusting third-party vendors is dangerous and wholly avoidable. Here's how.
68357593 - a silver key with a tag attached with a policies concept written on it.
Are you on social media? How's that working out for you? If you’re scratching your head on that one, we get you started with some basic analytics every small business and nonprofit can get their (free) hands around.
Government is investigating new options to manage citizens' identities. Lawmakers are launching new legislation to require even more businesses to collect and secure Social Security numbers. Guess who is caught in the middle?
Sharing, reposting, retweeting across social media have blurred the lines of authorship, spurring the growth of plagiarism outside of academia. What's a business - pushed to become a content creator - to do to protect its intellectual property?
55593100 - woman working at home office hand on keyboard close up.
Equifax's ginormous data breach pretty much puts an end to the question: Has my identity been exposed? Is there anything small businesses can takeaway from this? You bet: Size doesn't matter, but people do.
Building a culture of cyber security in your business is a critical piece of any functional security. And if you don't know what that entails, October, national Cyber Security Awareness Month, is a great time to get started.
We are just not good at planning for the worst; instead we hope for the best. But sometimes stuff happens. If you haven't taken the time to do a full disaster recovery or business continuity plan, you can still take a few steps toward protecting your business when the creek does rise.
Every week, the average business person probably sits through at least 2-3 presentations at a lunch, on a webinar, in a meeting. And through them all, we wonder: Can't these be better? Yes, they can. Here are four steps to get there.