Published September 14, 2016
Delta is paying big for the IT outage that occurred last month: millions of dollars in damages, 2300 cancelled flights, and significant reputational damage. Despite the harsh cut to the airline’s bottom line, Delta will probably still survive. But the real question is this: Can your business survive after long periods of downtime? A natural disaster, power outage, or successful hack can be the downfall of many small- to medium-sized businesses. But if you learn from the lessons of Delta’s IT mishap, your organization has a good chance of staying on its feet.
Published September 13, 2016
Many suffer from glossophobia, the fear of public speaking. Reasons vary, from traumatic childhood experiences to the inability to imagine your co-workers in their underwear. Enter Microsoft PowerPoint. This program helps visually depict a presentation, whether it be for a class project or a boardroom meeting, or to convince parents to buy your first car. With the nine following tips, you can maximize the efficiency of your next PowerPoint presentation.
Published September 12, 2016
From its drastically improved lock screen to GIF integration into your keyboard, the iOS platform has iPhone and iPad owners chomping at the bit for the latest iteration. Despite the completely open beta, Apple opted to shroud the official release in secrecy — until now. Along with an update on the mobile platform’s rollout was clarification about which devices will be eligible for the update — keep reading to find out what they are.
Published September 9, 2016
The reason why we gravitate toward the latest smartphone or the newest clothes can be attributed to our insatiable appetite for novelty — in layman’s terms, we really like new stuff. That’s why many go bonkers over the latest operating system update, Android Nougat. Aside from its connotations to a confectionary treat, the latest Android update comes with many nifty functions both apparent and subtle. Here’s the lowdown on 9 lesser-known features.
Published September 8, 2016
Sometimes technology solutions seem safer merely because they’re not widespread enough to be a lucrative target. Although increasingly popular, virtualization’s resilient protection protocols and low adoption rates tend to offset the cost vs. benefit considerations of creating an exploit. Or at least, that was the case. Late last month VMware announced an update to patch a gap that allowed attackers to compromise virtualized cloud infrastructures. We’ve compiled everything you need to know to protect yourself here.
Published September 7, 2016
It’s hard to deny how quickly the different types of ransomware multiply — they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like many other things, these technologically menacing forces are like “a wolf in sheep’s clothing” — impending danger lurks beneath the most seemingly innocent guises.
Published September 6, 2016
In today’s day and age, staying on top of your tech game is no easy feat, especially when new innovations pop up every single day. Today, many small- and medium-sized businesses have realized the benefits of adopting cloud database services for the betterment of their company. Google has recently announced many updates concerning its cloud services, all of which have surpassed the beta stage — music to the ears of business owners.
Published September 5, 2016
If your organization hosts data regulated by the US government, you’re familiar with the scare tactics used to sell hosting services. But what lurks behind those vague threats of expensive lawsuits and unfair liability burdens? HIPAA is nearly 100 pages long and few providers actually know what it requires. Unfortunately, it took a massive breach of healthcare-record data to give us a clearer picture, but let’s take a closer look at what we can glean from the incident.
Published September 2, 2016
Remember in 2012 when Dropbox’s data, which contained details of around two-thirds of its customers, were leaked? At the time, Dropbox reported that a collection of users’ email addresses had been stolen, but it wasn’t until recently that the company discovered that passwords had been stolen as well. So what does this mean for Dropbox users?
Published September 1, 2016
Love them or hate them, projectors are the modern day soapbox. They give you the platform to present your case to a wider audience without compromising your content. Like most hardware purchases, however, they’re accompanied by a list of measurements and specifications you likely have little experience with. If you’re in the market for some new projection hardware at your business, take a minute to brush up on the essentials here.