Blog

April 11th, 2014

imagesMillions of passwords, credit card numbers and other personal information is at risk as a result of a major breakdown in Internet security.
Read more.

Topic Security
April 11th, 2014

Security_Apr11_CThe security of your systems and communication, especially those that utilize the Internet should be paramount for any business. Over the past few weeks a massive new security flaw has been uncovered. This flaw, codenamed Heartbleed, could potentially expose all your vital data and communications that flows between your computer and websites online. All businesses and Internet users should be aware of this Heartbleed so that they can take steps to stay safe.

Background info about secure transmission of information on the Web

Most sites on the Internet rely on Secure Sockets Layer (SSL) technology to ensure that information is transmitted securely from a computer to server. SSL and the slightly older Transport Layer Security (TLS) are the main technology used to essentially verify that the site you are trying to access is indeed that site, and not a fake one which could contain malware or any other form of security threat. They essentially ensure that the keys needed to confirm that a site is legitimate and communication can be securely exchanged.
Read more.
Topic Security
April 10th, 2014

BusinessValue_Apr07_CPretty much every profession has its own language or set of terms that those working in that field quickly master and use on an everyday level with colleagues. However, this can pose problems for those people not involved directly with a specific industry. For example, it can be a challenge for business owners to effectively communicate with Web designers and developers. To make things easier, it can be useful to know some of the more common Web design terms.
Read more.

April 9th, 2014

SocialMedia_April07_CBusiness customers can be largely visual creatures; judging a company by how it looks. When it comes to social media campaigns if the content of your business posts is not visually appealing you may find it hard to engage your clients. The question is, what tools can you can use to create visual content, especially if you aren't a Photoshop expert or graphic designer.

In this day and age where compelling visuals are possible online, it is extremely important to learn how to create attractive visuals to aid your social media marketing campaigns. You at least need a working knowledge of how to enhance your photos and make them more attention-grabbing. There are a number of free or highly affordable tools out there that can help you do just that.
Read more.

Topic Social Media
April 9th, 2014

Criminals behind a vicious virus, Cryptolocker, are betting between $300 and $2500.  With just one innocent click any one employee can cause the data for an entire company to be compromised.
Read more.

Topic Ransomware
April 4th, 2014

Security_March31_CComputers must have appropriate protection from malware attacks. Aside from creating annoyances, malware infections can also affect the performance of your computer. Furthermore, the data on your system and confidential information that you use online may also be tracked and used without your knowledge. Because of the severity of the problems that it can cause you need to be very cautious about preventing malware infections, and know how to deal with them properly.

Signs of a malware infection

Before proceeding with the steps on how to respond to malware infections, we first need to learn about the signs and symptoms of a malware infection. These include:
  • Several pop-ups appear even when not browsing the Web.
  • Unusual slowness of the computer and Internet connection.
  • System hangs or freezes.
  • Corrupted programs.
  • Antivirus is disabled.
  • E-mails sent to or from your account which you did not send.
  • High network activity, even when not using large programs or accessing huge data.
  • Redirected access to some sites.

How to respond to a malware infection

In case you experience any of these symptoms, the first thing to do is to ensure that your antivirus and antispyware program is updated. This is to make sure that they detect the latest known threats on their database. You should then run scans to see if an infection is detected. If it is, the programs usually have a way to remove the infection. You then need to follow the steps the program recommends.
Read more.
Topic Security
April 4th, 2014

The recent massive customer data breaches that have occurred at well-known retailers is causing the government and businesses to take a deeper look into cybersecurity.
Read more.

Topic Security
April 3rd, 2014

VoIP_March31_CVoice over Internet Protocol, or VoIP, is one of the most popular modern methods of communication. It allows voice communication like a regular phone does, but it uses the Internet instead of the usual phone line. Many companies of all sizes in a multitude of industries have successfully adopted this technology. If you are still using landline phones for business communication you might want to look at the various advantages of adopting this technology.

More affordable communication costs

Using VoIP services like users communicate to other users either for free or at drastically lower call rates than regular providers, as long as they are connected to the Internet.
Read more.
Topic VoIP General
April 3rd, 2014

After nearly 13 years, Microsoft is calling an end to support for Windows XP on April 8.  This means a lot of people have a big decision to make.
Read more.

Topic Microsoft
April 2nd, 2014

BusinessValue_Mar31_CA business website is arguably the most important marketing and branding tool today. It is often the first level of interaction customers have with your company and many visitors will decide whether to work with you based solely on how your website is designed. Therefore, you need a website that is designed to engage and meet your visitors' needs. One of the best ways to achieve this is to learn about common mistakes other businesses have made when designing their websites to avoid making the same errors.
Read more.