Google AdWords’ new Customer Match feature allows for customized targeting of users, enabling small businesses to help their advertising dollars go further. After a long wait and many rumors, Google finally announced the addition of the Customer Match feature to its AdWords service at New York’s Advertising Week in November. This innovative new feature allows […]

Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for […]

Today more than ever, businesses depend on technology to get the job done. This new digital landscape requires that companies protected themselves with a well-planned and executed cyber security strategy. With the increase of cyber-attacks, businesses need to make cyber security a top priority, which starts with well-trained system users.   The more businesses depend […]

Law firms have a duty to protect their client’s confidential information it is an ethical and fiduciary responsibility. The costs associated with a law office’s cyber breach are more than the loss of customer confidence. This post explains what they are.   Following the news that many the nation’s premier legal firms were hacked to […]

Delta Air Lines’ recent essential IT systems outage clearly demonstrates the value of having IT support that can quickly respond when business critical systems go down. At some point, all businesses big or small will face an interruption in their essential IT systems service. The cause of such outages can vary, from external malware attacks […]

Ransomware has never been a more serious threat thanks to the new program Satan. Read on to learn more about Satan ransomware and how to protect yourself against this new threat. One particularly malicious cyber-attack which has grown more frequent in recent years is ransomware, a virus that infects a computer system and shuts it […]

Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be lost, so lock them up when unattended. Make sure a separate user account is created for each employee and require strong passwords. Administrative privileges should only be given to trusted IT staff and key […]

Consider implementing multifactor authentication that requires additional information beyond a password to gain entry. Check with your vendors that handle sensitive data, especially financial institutions, to see if they offer multifactor authentication for your account.

Law firms are targeting rich environments for cyber criminals. This post offers ways to protect law firms from data breaches. Where and how lawyers, paralegals, and legal support staff work is rapidly changing from office-based to working from remote locations. The American Bar Association tells us that, according to their 2015 Legal Technology Survey, 20% […]

Ransomware will continue growth in 2017. Learn how to help your business ward off these threats. Cybersecurity thought leaders have dubbed 2016 as The Year of Ransomware. The United States Federal Bureau of Investigation tells us that for 2017 ransomware activity will remain high and losses will likely top $1 billion for the second year […]

Facebook ads allow event planners to use a direct marketing approach Social media has outpaced other media platforms to such an extent that hard copy newspapers and magazines are becoming more and more rare with each passing year. Our pervasive use of devices has swelled the coffers of e-businesses with ad dollars. Facebook may be […]

The latest version of Microsoft Outlook is designed to be a personal information manager, not just email. Learn the shortcut tricks and a user can become a power communicator very quickly.   While many wish there might be another choice, it is unlikely that Microsoft Outlook as a user interface is going to go away […]

Search Our Tech Insights