Blog

What to learn from Sony’s security breach

What to learn from Sony’s security breach

The scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they are to multimillion dollar corporations.

New spear phishing attack identified

New spear phishing attack identified

When looking into the ways companies are hacked, you quickly realize that there are so many different tactics out there that it is mind-boggling. One of the more effective methods used recently is spear phishing, and in early December 2014, a new spear phishing attack was uncovered.

Looking at online backup solutions

Looking at online backup solutions

There are many different backup solutions out there available to small and medium sized businesses. While most owners are aware of the fact that any backup solution is important for a Disaster Recovery Plan, it can be tough to pick the right one for your business.

Using the PAR structure in emails

Using the PAR structure in emails

Email is now the most essential form of communication in business. Over the years, email has become much more informal than when it was first introduced. Sure, this makes it feel more natural, but there can be times when this casual style leads to misunderstanding, and in turn this can lead to lost productivity.

Coming soon: Facebook at Work

Coming soon: Facebook at Work

For many business owners, Facebook is both a blessing and a curse. While it is a great way to connect with customers, it can also be a major distraction for employees. Let’s face it, Facebook is here to stay, so there’s no getting round that, but there could be a way of stopping the social media site from being a negative in the workplace.

Regin – is it really a big threat?

Regin – is it really a big threat?

Malware is a constant threat to a business’s security. However, with many malware infections we tend to be able to learn a lot about them in a very short amount of time, which weakens the power of each attack. There is a new threat called Regin however, that is leaving many security experts baffled.

5 Common sales metrics

5 Common sales metrics

Often, when companies look to integrate business intelligence processes the first department that systems are applied to is sales. By employing metrics that track sales activity and any sales-related activity, business owners can gain a better picture of overall success.

A hacker’s paradise

A hacker’s paradise

You may not want to rely on the Food & Drug Administration’s (FDA’s) app approval system: Roughly 90 percent of Android health-care apps have been hacked, and 22 percent of them were FDA-approved. That information comes from the latest State of Mobile App Security report from Arxan Technologies, which attributed the high rate to a lack of information, security training and resources in the health-care field.

Health-care predictions for 2015

Health-care predictions for 2015

IDC Health Insights has issued its predictions for health-care in 2015, and just as one might expect, they revolve around cost, technology, and operational efficiency. Here are some of the key takeaways.

Cybersecurity. By 2020, 42% of digital health-care data will be unprotected.

Important disaster recovery lessons

Important disaster recovery lessons

Regardless of what your business is, or where you are located, you may at some point face a disaster that affects your business operations. In order to make it through troubled waters without serious harm to your business you need to have a Disaster Recovery Plan in place.