Blog

Finally, a social media strategy that works

Finally, a social media strategy that works

You’ve been waffling around on social media for months, hoping to get that increased spike in business you’ve heard rumors about. But after storming out of the gates, signing up for Twitter, Instagram, Linkedin and others, you’ve seen little by way of results – and have less than a few hundred social media followers to show for it.

To connect or not: LinkedIn strangers

To connect or not: LinkedIn strangers

You just opened up your inbox to see a LinkedIn invitation to connect with John Doe. You’ve never met the guy, but your interest is peaked. “Is he a friend of a friend? Is he interested in hiring me? What’s his motive?” You might check out his profile to get a better idea about him, but then you reach a fork in the road.

Added security to protect FaceTime and iMessage

Added security to protect FaceTime and iMessage

Whatever services and systems we use to share, store or transfer personal and business information online, we want the reassurance that our data is safe and that everything possible is done to prevent it from falling into the wrong hands. But we also know that security breaches happen, as they did with the large-scale celebrity photo leaks in 2014. Since then, Apple platforms in particular have been prevalent in discussions about the security of such platforms – but Apple is now seeking to bolster its security defenses with the launch of a two-step authentication feature for the FaceTime and iMessage applications.

How to protect yourself against Poweliks

How to protect yourself against Poweliks

Think your security is taken care of with a frequent anti-virus scan? Think again. While we’ve all become used to the idea that viruses, worms and other malware – however much disruption and damage they cause to our systems – can be detected and removed thanks to the tracks they leave as they create havoc, that’s no longer something to count on.

5 Google apps you’ve probably never heard of

5 Google apps you’ve probably never heard of

Whether it’s checking your bank balance, the weather forecast or a flight delay, we have come to use apps to enable us to carry out routine tasks at the touch of a button and without leaving our phones. The Google Apps suite of programs like Drive, Gmail and Calendar can already help businesses to speed up work processes and collaborate more effectively, but plenty more apps from the Google powerhouse can boost your productivity in and out of work.

Social media for business development

Social media for business development

Regardless of the industry in which you operate, it’s undeniable that social media has become an essential platform for many businesses of all sizes to easily engage and interact with customers and potential customers, as well as boost visibility. But there’s more to social media than market reach and penetration and it can prove to be a powerful tool for driving dynamic business development too.

Give productivity a new year boost with Gmail

Give productivity a new year boost with Gmail

For all its benefits in modern communication, we all know how easy it can be to give too much time over to email – and for a small business owner, that is time that could be better spent increasing sales and improving your bottom line. If you feel like a slave to email, 2015 might be the time to shake things up – and these productivity hacks for Gmail will help you do that.

What to learn from Sony’s security breach

What to learn from Sony’s security breach

The scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they are to multimillion dollar corporations.

New spear phishing attack identified

security_dec24_CWhen looking into the ways companies are hacked, you quickly realize that there are so many different tactics out there that it is mind-boggling. One of the more effective methods used recently is spear phishing, and in early December 2014, a new spear phishing attack was uncovered.