I love to write. The best part is getting to meet and talk to people. Followed closely by the opportunity to learn something new. In a writing career that's spanned 40 years, I've always found the chance to learn something and share it with others was challenging, fulfilling and great fun. These are some articles I've enjoyed writing for a variety of different reasons. I am happy to entertain freelance assignments for publication or your company's website or blog. Email me to start the conversation. Some of these links will download a pdf and others will take you to a website. Thanks for reading.
– Laura Haight
BI-WEEKLY COLUMN IN THE UPSTATE BUSINESS JOURNAL
The Digital Maven column focuses on technology for small business, specifically making technology understandable, relatable and actionable. The most recent 30 posts are here, but you can view and search the entire archive as well.
Every week, the average business person probably sits through at least 2-3 presentations at a lunch, on a webinar, in a meeting. And through them all, we wonder: Can't these be better? Yes, they can. Here are four steps to get there.
Solopreneurs, small businesses and nonprofits may be missing out on a lot of data opportunities. And most of then are free.
In less than a half-century, the world of work may be changed forever. That's not as far away as you think - not for your children and grandchildren. How will we get there and what will we do when there's no work to get?
IT has a diversity problem and it goes far beyond hiring. The solutions are baked in the cake and require culture changes in boardrooms and data centers.
Hundreds of thousands of users wanted to cry after getting the WannaCry Ransomware variant. Still, there were protections out there and so there are some lessons to be learned.
Small businesses face a daily juggle - say 'yes' to one thing and 'no' to something else. Three common technology areas are often places where businesses choose to go cheap. In today's security climate, that's risky. Here's why.
Nonprofits live and die by volunteer contributions. But often they risk security in the process. There are some do's and don't's that can help you have both!
What's the real impact of the Internet privacy rollback and what's next on the president's agenda? Strap in. It's going to be a bumpy ride. (Thank you, Bette Davis!)
On the face of it, all cloud providers kind of seem the same. But they aren't. Here are some conversation starters to help you find the provider who'll be the right fit for your business.
Cloud speak. It's a language all its own. You'll need at least a few terms under your belt to talk to your provider. Here's a starter glossary.
Few things are 100 percent foolproof, but business takes it on chin when the Internet laces up the gloves.
It was a good deed with a positive result, but it could easily have been a very successful and costly scam. So there are lessons to be learned from "the guy who walked into a bar".
CES was full of future tech and hopeful entrepreneurs, but what are the ideas that will stick? Sarah Segrest of Wynit knows.
Most of us are relatively data illiterate, yet we have massive amounts of data. Without the skills to identify what it all means, it's an unexplored opportunity. Enter artificial intelligence.
Technology needs a plan just like any other business function. Create a roadmap for 2017 to make the most out of your tech year.
What if you could charge your car while you were driving down the highway? Or power up your cell phone just by walking around using it? Technology freed from outlets, bricks, cables and adapters that makes us truly mobile? That would really be powerful. And it may be closer than you think.
Technology in the workplace makes it even more likely an employee can purloin sensitive company information, plans or client lists. Businesses are making it even easier.
The Internet of Things has vast possibilities. But also great risks. Don't let your devices becoming unwitting conscripts in an Internet attack.
Planning for unexpected and unlikely is a hard thing. But ask businesses up and down the South Carolina coast how important it is to have an emergency plan. Hurricane, tornado. power outage, ransomware - the disaster may be different, but you need a response.
Technology often plays a starring role in films and TV series. Here are some of our favorites. Add yours to the list with #UBJFilmTech
Recent data breaches, like the Bon Secours exposure of 655,000 records, illustrate a major cyber security problem: It's not enough to have a good handle on your own security - you need to know how your partners and vendors are protecting your data as well.
Nonprofits, regardless of size are a profitable target for hackers. The reliance on volunteers, tighter purse strings, and lesser likelihood of having strong IT support makes them attractive targets. Here's how to even the odds a bit.
61633338 - people, family, charitable organizations and nursing concepts, close-up of two hands holding a family of four
Technology and social media played a pivotal role in the last few weeks of social upheaval, exceeding the boundaries of their original design. When that happens, we are often confronted with the unintended circumstances and unforeseen situations that make us ask: Should we just because we can? Can we stop, if we want to?
The markets tanked, the Pound Sterling fell off the white cliffs of Dover, but there were some winners in the Brexit vote: Cybercriminals. Their currency of choice - Bitcoin - soared as quickly as the Pound fell.
21761492 - bitcoin
Millennials, mobile workforce, remote employees all present a special challenge for businesses facing the implementation of new overtime rules. Technology can help get your arms around it.
Ransomware is a real threat to small businesses and even individuals. There are some steps you can take to be better protected against it; and others that will make it easier for you to survive an infection. Think of it as a hostage response plan for data-napping.
Public Wi-Fi is a convenience for the mobile workforce, but it's also a big risk. Here are some steps to protect yourself, your company if you have to use open Wi-Fi.
Are you one of the 65 percent of business bloggers who haven't published a new post in more than a year? If so, maybe it's because you don't know how to tell your story. Here are some suggestions.
Improper disposal of electronics and peripherals is a global problem, contributing to a critical health crisis in the developing world, as children and families live and work in a synthetic soup of dangerous components. We can make a difference by disposing of computers properly.
Privacy vs. Security. The battle over encryption of data on mobile devices is just the first salvo in a civil rights struggle that can have long-standing implications. What do we want more? Why can't we have both.