Blog

Is your computer infected with malware?

2016Mar29_Security_BHas your computer been running slow lately? Are you getting a bunch of unwanted pop-ups? Then it’s possible your system’s security has been breached. Being able to identify whether or not your computer is infected with malware will allow you to quickly come up with antivirus solutions to protect your system.

Outdated DR myths worth ousting

2016Mar21_BusinessContinuity_BWe are no longer in the dark ages of Disaster Recovery. With the onset of cloud computing, DR has become more efficient and affordable than ever. Despite this fact, many business owners still cling to their medieval DR mindsets and myths that belong in debates among king Arthur and his knights of the round table.

Should you monitor your employees online?

2016Mar15_Security_BTo monitor your employees, or not to monitor, that is the topic of this blog post today. If you’ve ever considered monitoring your staff’s online activities, you may’ve been lost as to whether or not it’s the right decision. So we’ve listed the pros and cons of doing it, and some tips to make it a success if you go through with it.

10 Tools to help you get ahead in social media

2016Mar14_SocialMedia_BSocial media marketing can be time consuming. You may spend hours upon hours trying to get it right and still see little growth in your followers. So what can you do to be more effective and save time in the process? Here are ten tools that can streamline your social media efforts and even offer guidance.

Why BI is for everyone

2016JMar10_BusinessIntelligence_BIf you’ve managed to convince yourself that only large enterprises have the money to take advantage of Business Intelligence (BI), it’s time to think again. While it’s true that in the past you needed the help of pricey specialists to really delve into BI, these days a range of self-service tools mean that small- and medium-sized businesses can do much more by themselves.

IT security concerns of the finance sector

2015Feb29_Security_BThe time to increase cyber situational awareness and establish better security strategies has never been more opportune. Since 2015, the number of attacks on the financial services sector has increased and shows no signs of letting up. Whether it be extortion or credential-stealing malware, different tactics are utilized to target desired areas.

Improve your online image in 4 steps

2016Feb18_MicrosoftWindowsNewsAndTips_BReputation and image management has come a long way from being the vapid process it was decades ago. It is now vital to those wishing to find wealth, trustworthiness and entrepreneurial longevity, and nowhere is this more important than on the Internet.

Be more productive in life and work

2016Feb15_Productivity_BIf you’re grinding away at your desk, stuck at the office for another late night, wondering when you’ll ever complete that final task on your to-do-list, there is hope: principles that can be applied to make you more productive. These ideas will not only improve the quality of your work and business, but also the quality of your life.

How to gain business value from LinkedIn

2016Feb12_BusinessValue_BWhile there is a lot of information out there about how to gain value from LinkedIn, most of it is aimed at large companies or individuals. Some of this information can be useful, but some of it can cause you to make mistakes that present your business in the wrong light.