Enterprise

Equifax’s Leak: lessons learned

Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what ...

Office 365 threat comes with new techniques

Office 365 threat comes with new techniques

If you're using Office 365, you wouldn’t want to miss this news: Online scammers are carrying out a highly customized spear-phishing campaign to steal ...

Beware of a new Locky-type ransomware

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although ...

Are all hackers out to do harm? Not so fast

Are all hackers out to do harm? Not so fast

Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers ...

Know these types of malware to stay protected

Know these types of malware to stay protected

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way ...

Nyetya ransomware: what you need to know

Nyetya ransomware: what you need to know

Nyetya, a variant of the Petya ransomware, is spreading across businesses all over the world. Although it shares the same qualities as WannaCry -- a ransomware ...

Does the CIA have access to your router?

Does the CIA have access to your router?

There are an exhausting number of cyber security threats to watch out for, and unfortunately you need to add another to the list. A recent leak from the ...

Fixing computers drains your firm’s funds

Fixing computers drains your firm’s funds

Aside from overseeing your business’s network security, IT security staff are also adept at fixing personal computers. However, that doesn’t necessarily ...

Read more from this category

Small Business

A beginner's guide to creating Facebook ads

A beginner's guide to creating Facebook ads

No one can deny that social media has become a powerful online marketing channel. It’s cheaper, less complicated, more effective, and…a lot cooler. ...

Social engineering exploits Facebook

Social engineering exploits Facebook

You’ve received a message from one of your Facebook friends. You click on the link not knowing what you’ve gotten yourself into. This describes one ...

Social media helps improve content

Social media helps improve content

To truly understand their customers’ purchasing habits, all content marketers have to do is follow the clues left on social media platforms. By doing ...

The Facebook tools your business needs

The Facebook tools your business needs

Businesses in the digital age rely on a strong online presence to stand a chance against stiff competition. This explains why many SMBs are turning to ...

Using Pinterest to market your SMB

Using Pinterest to market your SMB

Many small- and medium-sized businesses are abandoning traditional marketing methods in favor of social media platforms, and for good reason. Take Pinterest, ...

Boost your SMB’s social media presence

Boost your SMB’s social media presence

Many small- and medium-sized businesses utilize some type of social media or content marketing strategy. But since your competitors are possibly using ...

Why you should review social media policies

Why you should review social media policies

With more and more social media platforms popping up all the time, it can be tough to keep track of social media policies and assess their effectiveness. ...

A beginner’s guide to Snapchat for business

A beginner’s guide to Snapchat for business

The 21st century is the age of social media, with a plethora of outlets available, users are spoilt for choice. Business owners are faced with the same ...

Read more from this category