I love to write. The best part is getting to meet and talk to people. Followed closely by the opportunity to learn something new. In a writing career that's spanned 40 years, I've always found the chance to learn something and share it with others was challenging, fulfilling and great fun. These are some articles I've enjoyed writing for a variety of different reasons. I am happy to entertain freelance assignments for publication or your company's website or blog. Email me to start the conversation. Some of these links will download a pdf and others will take you to a website. Thanks for reading.
– Laura Haight
BI-WEEKLY COLUMN IN THE UPSTATE BUSINESS JOURNAL
The Digital Maven column focuses on technology for small business, specifically making technology understandable, relatable and actionable. The most recent 30 posts are here, but you can view and search the entire archive as well.
Facebook and its platforms has become the defacto marketing system for many businesses. But is all the controversy, the disruption, public scrutiny, and anger getting to be too much? What will happen if we break up?
Technology is embedded in every aspect of life and work. Along with those advantages come significant privacy concerns, and the potential that technology and privacy cannot coexist. Can privacy survive in the 21st century?
Failure is the best determinator of future success. There are a lot of more inspiring quotes on this subject than this, but the point is the same. To help us all learn from others’ mistakes, periodically I like to take a current event and dig into what we can learn from it. Enter Mark Begor, the CEO of Equifax.
Community service is highly valued in the Upstate and we are home to thousands of local nonprofits, churches, educational institutions and local chapters of national organizations. But community members aren’t the only ones who highly value nonprofits. Hackers do too.
Vendor relationships are important. But they are also an security exposure – as many hacked corporations have learned. Managing vendor relationships from a security standpoint is a crucial piece of your cybersecurity puzzle.
One of the big reasons many system implementations fail is poor testing that gets the system off to a rocky start. Follow some best practices to ensure your testing smooths the road for a successful launch.
Jan. 28 is Data Privacy Day. Celebrate by checking out these five commons risks for both business and individuals. Up your security game for 2019.
The US again has called behind Europe and even parts of the development world in adapting to mobile payments. New rules from Visa could change that and make 2019 the year that moves us closer to cashless.
Are you spending too much money to keep old data at the ready? Answer four questions to see if cold storage (archiving) is a better (cheaper) practice.
We all hate email. Yet we are addicted - enslaved - by it. Get control of it and make it work for you. The best part: You already have the tool you need to do it on your computer.
A disaster recovery plan needs to be tested and re-tested. Here are 10 keys to running an effective tabletop test of your plan.
We’ve been dealing with cybersecurity for enough years now, yet our passwords our still weak, our procedures haven’t caught up with hackers’ skills, and our overall risk is greater. Why aren’t we getting any better at this?
Voting is a lot more secure than you would think if you just followed the antics of the company that provides all voting machines in South Carolina. Whatever your political leanings, there are lessons businesses can learn from how this company has responded to adversity.
Solopreneurs do a lot of things themselves using technology: templated contracts, software-designed pitches, free levels of higher end tools for CRM and other functions. But one thing they really need a professional for is designing logos and collateral. Learn Why.
Cryptocurrencies are geopolitically agnostic. They can be used across borders without being subject to any country’s currency manipulation. They can be held as an investment with all the risks and rewards. Advocates call it the first global currency. Opponents, like Warren Buffet, call it “rat poison squared.” If you’re a geek, it’s just cool.
Facebook just keeps getting in deeper and deeper. Marketing mavens may wonder where their audience will go if Facebook fails; Digital Mavens wonder why we keep giving up our privacy and then wondering where it went.
Coupled with the ever-present onslaught of new data breaches, security vulnerabilities, and data leaks, it’s not unreasonable to think that most of us would have a passing understanding of the social media risk-benefit equation by now. But we might be wrong about that.
The Cambridge Analytica-Facebook connection is complex, deeply flawed, and now, deeply damaging. But there is an important takeaway: Trusting third-party vendors is dangerous and wholly avoidable. Here's how.
68357593 - a silver key with a tag attached with a policies concept written on it.
Business Intelligence is a process not a destination. Do you have the knowledge and the tools to maximize all the information you intrinsically have? We'll see.
Are you on social media? How's that working out for you? If you’re scratching your head on that one, we get you started with some basic analytics every small business and nonprofit can get their (free) hands around.
What's on the horizon? The EU throws down the gauntlet for security, states stake a claim to lead on cybersecurity, and virtual assistants may help make a 20-year-old promise a reality.