Blog

Encryption in The Cloud – How safe is your data?

Cloud technology can add a whole new layer of protection to your data backup system. However, it’s important to recognize that there’s one key difference between cloud service providers that will determine how safe your data is.  When stored data – aka “data at rest” (vs.

Conquering Connecting

“Everyone looks so much better when they smile.” – Jimmy Fallon, host of the legendary The Tonight Show

What a meteoric ride Jimmy Fallon has had to the top!

How did this son of an IBM machine repairman get to the chair once occupied by maybe the most legendary figure in comedy TV for 30 years straight, Johnny Carson?

He did it through exceptional networking.

Shiny New Gadget Of The Month: All This… For Just Five Bucks???

If you haven’t tried Fiverr.com yet, you’re in for a treat.  Fiverr is a global online marketplace where freelancers offer to perform an amazing variety of tasks and services, starting at just $5.00.

Need a whiteboard-style video for your website?  A new logo?  Help creating a PowerPoint or Prezi presentation?  Then you need to check out Fiverr.

10 Things You Must Do Now To Prevent A Costly Data Disaster

In less than 60 seconds, you are about to learn 10 things that could save you days – or even weeks – of downtime, not to mention the undue stress on your company, and potentially thousands of dollars lost, due to a data disaster...

Use this article as your checklist in a conversation with your IT company to assure that your business has the right plan in place to get back up and running quickly if and when disaster strikes.

Different types of hackers defined

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you need to protect.