Online Privacy and Cookies

Have you ever been on Google looking for something and then it shows up in your Facebook feed? Have you noticed that advertisements on the internet seem more and more applicable to your wants and needs? Well, you can thank (or scorn) big data for that. The practice is commonly …

How To: Successful Remote Teams

  Technology has given business owners and manager an abundance of options in how, where, and when to do business. Many companies have introduced technologies that enable employees to telecommute. Giving employees this option increases productivity 13%, reduces turnover, improves morale, reduces a firm’s environmental impact, and can save an …

Turning Data into Information (Part 1)

Data and business have traveled hand in hand through the ages. Before the first great stories were recorded in writing, traders and businessmen were chiseling numbers on stones to keep records of their transactions. The days of the stone tablet have long since passed, and the data that was once …

Malware Campaign Tricked Networks Since 2015

About AdGholas  According to IT News, there has been a long-running malvertising campaign – known as AdGholas – that infected thousands of computer each day. This resulted in between 1 million and 5 million page hits from malicious advertisements in over 100 ad exchanges. It is estimated that AdGholas current …

Small Business Hardware

If you are starting a small business, or expanding your existing business, here are some technology tips for planning your hardware needs. Remember that the minute you launch your website or hand out a business card you are visible to the world. Potential customers should see you with your best …

An Introduction to Passwords

Most of us – especially those reading this blog – have used one or more passwords in the past 24 hours. Passwords protect our personal and business information, but how secure are they? The first computer passwords were developed in 1961 by MIT for CTSS applications. Since then, passwords have …

Introduction to Encryption

If your passwords are not encrypted, then you are leaving your data open to hackers. Encryption, simply put, converts readable strings of text into a secret code. Simple encryption might be “banana” as “21141141” where 1 = A, 2 = B, and 14 = N. Obviously encryption codes are well …