IT jargon: a glossary of cybersecurity terms

Everyone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today. […]

LinkedIn Alumni improves how you network

Aside from having an up-to-date LinkedIn profile, there seems to be more waiting around than getting job interviews or receiving promotions. Why so? You’ve given all the relevant information needed to land a job, or to convince your boss that it’s time for you to step up the corporate ladder — but what else is […]

What can we learn from Delta’s IT outage?

Companies can pay a hefty sum if they ever experience any downtime. In fact, Delta Air Lines had a bad bout of severe downtime just last month. In just three days, the airline company cancelled 2300 scheduled flights and suffered $150 million in income loss. That doesn’t even account for the considerable reputational damage from […]

New SMB dashboard app from Twitter

If you aren’t a celebrity or a multimillionaire capable of purchasing millions of Twitter followers, it’s quite hard to establish a notable online presence these days, especially if you’re a small- or medium-sized business. It’s undeniable that the benefits of a strong online presence on prominent social media platforms such as Twitter are numerous. With […]

2016’s Best CRM Software Options

What are the components of a good CRM software? Must it fit into your budget? Should it be easily navigable? Or must it have a simple interface? All the aforementioned qualities are vital, but none of them are important if they don’t meet all your business’s unique needs.The more pressing question is this: how would […]

Beware of these social engineering tactics

As the spectacle and competitive atmosphere of the Rio Olympic Games have drawn the world’s attention, hackers who use social engineering are inching closer to our private information. Although our systems may be prepared for the likes of malware and worms, social engineering is a different beast of its own. If used effectively, hackers can […]

How does Microsoft FindTime really work?

Theoretically, scheduling meetings should be virtually hassle-free. But in reality, simply agreeing on a mutually compatible time is often an impossible task. On top of hectic schedules, you have different departments that have their own time constraints. What if there was a tool that could take care of all that for you? That’s where Microsoft […]

Two new tools for defeating ransomware

A simple Google search of “ransomware” returns just over 9 million results. So, too, does a search for “Three Mile Island,” the location of the late-70’s Pennsylvania nuclear meltdown. And while we don’t mean to equate the near catastrophe of the latter to having your company’s data hijacked by computer hackers, ransomware can in many […]