Blog

Using the PAR structure in emails

Using the PAR structure in emails

Email is now the most essential form of communication in business. Over the years, email has become much more informal than when it was first introduced. Sure, this makes it feel more natural, but there can be times when this casual style leads to misunderstanding, and in turn this can lead to lost productivity.

Coming soon: Facebook at Work

Coming soon: Facebook at Work

For many business owners, Facebook is both a blessing and a curse. While it is a great way to connect with customers, it can also be a major distraction for employees. Let’s face it, Facebook is here to stay, so there’s no getting round that, but there could be a way of stopping the social media site from being a negative in the workplace.

Regin – is it really a big threat?

Regin – is it really a big threat?

Malware is a constant threat to a business’s security. However, with many malware infections we tend to be able to learn a lot about them in a very short amount of time, which weakens the power of each attack. There is a new threat called Regin however, that is leaving many security experts baffled.

5 Common sales metrics

5 Common sales metrics

Often, when companies look to integrate business intelligence processes the first department that systems are applied to is sales. By employing metrics that track sales activity and any sales-related activity, business owners can gain a better picture of overall success.

A hacker’s paradise

A hacker’s paradise

You may not want to rely on the Food & Drug Administration’s (FDA’s) app approval system: Roughly 90 percent of Android health-care apps have been hacked, and 22 percent of them were FDA-approved. That information comes from the latest State of Mobile App Security report from Arxan Technologies, which attributed the high rate to a lack of information, security training and resources in the health-care field.

Health-care predictions for 2015

Health-care predictions for 2015

IDC Health Insights has issued its predictions for health-care in 2015, and just as one might expect, they revolve around cost, technology, and operational efficiency. Here are some of the key takeaways.

Cybersecurity. By 2020, 42% of digital health-care data will be unprotected.

Important disaster recovery lessons

Important disaster recovery lessons

Regardless of what your business is, or where you are located, you may at some point face a disaster that affects your business operations. In order to make it through troubled waters without serious harm to your business you need to have a Disaster Recovery Plan in place.

Microsoft asking to audit licenses

Microsoft asking to audit licenses

While there are many IT expenses business owners need to worry about, one of the biggest is usually software. In order to remain compliant and avoid potential legal disputes, businesses often invest heavily in software. If you have Microsoft software licenses, you may receive an email from the company asking you to audit these licenses.

New Windows Server bug discovered

New Windows Server bug discovered

The discovery of the Heartbleed bug earlier this year was thought to be the biggest security issue of the year. While it has largely been dealt with, Microsoft has recently announced a similar and equally large potential threat. While details are fairly scarce, and there is a fix to avoid this issue, it is a threat all businesses with Windows Servers should be aware of.