I love to write. The best part is getting to meet and talk to people. Followed closely by the opportunity to learn something new. In a writing career that's spanned 40 years, I've always found the chance to learn something and share it with others was challenging, fulfilling and great fun. These are some articles I've enjoyed writing for a variety of different reasons. I am happy to entertain freelance assignments for publication or your company's website or blog. Email me to start the conversation. Some of these links will download a pdf and others will take you to a website. Thanks for reading.
– Laura Haight
BI-WEEKLY COLUMN IN THE UPSTATE BUSINESS JOURNAL
The Digital Maven column focuses on technology for small business, specifically making technology understandable, relatable and actionable. The most recent 30 posts are here, but you can view and search the entire archive as well.
Sharing, reposting, retweeting across social media have blurred the lines of authorship, spurring the growth of plagiarism outside of academia. What's a business - pushed to become a content creator - to do to protect its intellectual property?
55593100 - woman working at home office hand on keyboard close up.
Moving your business fully into the cloud can be a leap of faith. Here are some things to take into consideration and questions to ask before you decide to jump.
Equifax's ginormous data breach pretty much puts an end to the question: Has my identity been exposed? Is there anything small businesses can takeaway from this? You bet: Size doesn't matter, but people do.
10810704 - masks with theatre concept
Building a culture of cyber security in your business is a critical piece of any functional security. And if you don't know what that entails, October, national Cyber Security Awareness Month, is a great time to get started.
Crisis communication today goes far beyond a disaster or major business issue. It can be as small as a social media post gone viral. It can also be an opportunity. If you're prepared for it.
We are just not good at planning for the worst; instead we hope for the best. But sometimes stuff happens. If you haven't taken the time to do a full disaster recovery or business continuity plan, you can still take a few steps toward protecting your business when the creek does rise.
Breaking up with your IT professional can be painful. But it doesn't have to be. Prepare yourself with a few basic protections.
Every week, the average business person probably sits through at least 2-3 presentations at a lunch, on a webinar, in a meeting. And through them all, we wonder: Can't these be better? Yes, they can. Here are four steps to get there.
Solopreneurs, small businesses and nonprofits may be missing out on a lot of data opportunities. And most of then are free.
In less than a half-century, the world of work may be changed forever. That's not as far away as you think - not for your children and grandchildren. How will we get there and what will we do when there's no work to get?
IT has a diversity problem and it goes far beyond hiring. The solutions are baked in the cake and require culture changes in boardrooms and data centers.
Hundreds of thousands of users wanted to cry after getting the WannaCry Ransomware variant. Still, there were protections out there and so there are some lessons to be learned.
Small businesses face a daily juggle - say 'yes' to one thing and 'no' to something else. Three common technology areas are often places where businesses choose to go cheap. In today's security climate, that's risky. Here's why.
Nonprofits live and die by volunteer contributions. But often they risk security in the process. There are some do's and don't's that can help you have both!
What's the real impact of the Internet privacy rollback and what's next on the president's agenda? Strap in. It's going to be a bumpy ride. (Thank you, Bette Davis!)
On the face of it, all cloud providers kind of seem the same. But they aren't. Here are some conversation starters to help you find the provider who'll be the right fit for your business.
Cloud speak. It's a language all its own. You'll need at least a few terms under your belt to talk to your provider. Here's a starter glossary.
Few things are 100 percent foolproof, but business takes it on chin when the Internet laces up the gloves.
It was a good deed with a positive result, but it could easily have been a very successful and costly scam. So there are lessons to be learned from "the guy who walked into a bar".
CES was full of future tech and hopeful entrepreneurs, but what are the ideas that will stick? Sarah Segrest of Wynit knows.
Most of us are relatively data illiterate, yet we have massive amounts of data. Without the skills to identify what it all means, it's an unexplored opportunity. Enter artificial intelligence.
Technology needs a plan just like any other business function. Create a roadmap for 2017 to make the most out of your tech year.
What if you could charge your car while you were driving down the highway? Or power up your cell phone just by walking around using it? Technology freed from outlets, bricks, cables and adapters that makes us truly mobile? That would really be powerful. And it may be closer than you think.
Technology in the workplace makes it even more likely an employee can purloin sensitive company information, plans or client lists. Businesses are making it even easier.
The Internet of Things has vast possibilities. But also great risks. Don't let your devices becoming unwitting conscripts in an Internet attack.
Planning for unexpected and unlikely is a hard thing. But ask businesses up and down the South Carolina coast how important it is to have an emergency plan. Hurricane, tornado. power outage, ransomware - the disaster may be different, but you need a response.
Technology often plays a starring role in films and TV series. Here are some of our favorites. Add yours to the list with #UBJFilmTech
Recent data breaches, like the Bon Secours exposure of 655,000 records, illustrate a major cyber security problem: It's not enough to have a good handle on your own security - you need to know how your partners and vendors are protecting your data as well.
Nonprofits, regardless of size are a profitable target for hackers. The reliance on volunteers, tighter purse strings, and lesser likelihood of having strong IT support makes them attractive targets. Here's how to even the odds a bit.
61633338 - people, family, charitable organizations and nursing concepts, close-up of two hands holding a family of four
Technology and social media played a pivotal role in the last few weeks of social upheaval, exceeding the boundaries of their original design. When that happens, we are often confronted with the unintended circumstances and unforeseen situations that make us ask: Should we just because we can? Can we stop, if we want to?