Digital Thinking Gallery
Technology is embedded in every aspect of life and work. Along with those advantages come significant privacy concerns, and the potential that technology and privacy cannot coexist. Can privacy survive in the 21st century?
Communicating while on business travel can be risky business. Travelers are often targeted by hackers even as they are forced to use open systems in hotels, airports, and coffee shops to communicate. One solution: secure VPN.
Failure is the best determinator of future success. There are a lot of more inspiring quotes on this subject than this, but the point is the same. To help us all learn from others’ mistakes, periodically I like to take a current event and dig into what we can learn from it. Enter Mark Begor, the CEO of Equifax.
Breaking the glass ceiling in the technology industry is important - for both women and girls and the industry itself. But in the future world of work, coding is not an end goal; it’s a jumping off point.
Community service is highly valued in the Upstate and we are home to thousands of local nonprofits, churches, educational institutions and local chapters of national organizations. But community members aren’t the only ones who highly value nonprofits. Hackers do too.
Vendor relationships are important. But they are also an security exposure – as many hacked corporations have learned. Managing vendor relationships from a security standpoint is a crucial piece of your cybersecurity puzzle.
One of the big reasons many system implementations fail is poor testing that gets the system off to a rocky start. Follow some best practices to ensure your testing smooths the road for a successful launch.
Jan. 28 is Data Privacy Day. Celebrate by checking out these five commons risks for both business and individuals. Up your security game for 2019.
The US again has called behind Europe and even parts of the development world in adapting to mobile payments. New rules from Visa could change that and make 2019 the year that moves us closer to cashless.
Are you spending too much money to keep old data at the ready? Answer four questions to see if cold storage (archiving) is a better (cheaper) practice.
We all hate email. Yet we are addicted - enslaved - by it. Get control of it and make it work for you. The best part: You already have the tool you need to do it on your computer.
A disaster recovery plan needs to be tested and re-tested. Here are 10 keys to running an effective tabletop test of your plan.
We’ve been dealing with cybersecurity for enough years now, yet our passwords our still weak, our procedures haven’t caught up with hackers’ skills, and our overall risk is greater. Why aren’t we getting any better at this?
Manufacturing resurgence fueled by technology that keeps workers more safe and more productive.
Voting is a lot more secure than you would think if you just followed the antics of the company that provides all voting machines in South Carolina. Whatever your political leanings, there are lessons businesses can learn from how this company has responded to adversity.
Solopreneurs do a lot of things themselves using technology: templated contracts, software-designed pitches, free levels of higher end tools for CRM and other functions. But one thing they really need a professional for is designing logos and collateral. Learn Why.
Cryptocurrencies are geopolitically agnostic. They can be used across borders without being subject to any country’s currency manipulation. They can be held as an investment with all the risks and rewards. Advocates call it the first global currency. Opponents, like Warren Buffet, call it “rat poison squared.” If you’re a geek, it’s just cool.
You’ve got great ideas and passion about creating a business. But what you don’t know can hurt you. Here are some IT things you need to get right – right from the start.
Phone systems just seem complicated. But you shouldn’t let that stop you from exploring the capabilities in 21st century systems. Here’s some info to get you started.
Facebook just keeps getting in deeper and deeper. Marketing mavens may wonder where their audience will go if Facebook fails; Digital Mavens wonder why we keep giving up our privacy and then wondering where it went.
Not all IT professionals are created equal. Do you have the support that’s right for your business? Do you know what to expect and how to ask for it? That’s OK, we do.
68 years ago, Isaac Asimov imagined a future where robots and humans coexisted. They may prove to be less human-like than Asimov envisioned, but the robotic age is maturing.
Coupled with the ever-present onslaught of new data breaches, security vulnerabilities, and data leaks, it’s not unreasonable to think that most of us would have a passing understanding of the social media risk-benefit equation by now. But we might be wrong about that.
The Cambridge Analytica-Facebook connection is complex, deeply flawed, and now, deeply damaging. But there is an important takeaway: Trusting third-party vendors is dangerous and wholly avoidable. Here's how.
68357593 - a silver key with a tag attached with a policies concept written on it.
Business Intelligence is a process not a destination. Do you have the knowledge and the tools to maximize all the information you intrinsically have? We'll see.
Have you had your annual business checkup yet? No? There are a lot of banana peels lying around and only a matter of time before someone slips.
Are you on social media? How's that working out for you? If you’re scratching your head on that one, we get you started with some basic analytics every small business and nonprofit can get their (free) hands around.
Why don’t we get better innovation results? We certainly talk about it a lot. Innovation is really finding a different way to do something. And there’s a lot of that right in front of us.
How often do you read tech news? That’s what I figured. Geek speak often hides important information that business leaders need to know. Here are two in recent events.
What's on the horizon? The EU throws down the gauntlet for security, states stake a claim to lead on cybersecurity, and virtual assistants may help make a 20-year-old promise a reality.