In 2014 we saw numerous security breaches around the world. We saw the security compromised in such big names as Sony, Target, Goodwill Industries, Home Depot, JP Morgan and Michaels. For 2015, most security analysts are predicting an even greater increase in the number of security breaches and cyber-attacks. In the 2015 Cyber Threat Defense […]

The Apple Watch has finally been released and the critics are, of course, following up with their list of failed expectations of the device and the distant observations of how they would do things differently. While the technology has a number of obvious features that attract the average consumer, the question of how businesses can […]

When you open the box on a new tablet, cell phone, netbook or laptop it is tempting simply to hit the start button and go. Unfortunately, doing that may be a big mistake, not because you need to read the instructional manual or pick out a waterproof case, but because there is a possibility that […]

It is commonplace today to hear businesses voicing concerns about using cloud based services as though the cloud is much less secure than any system you might purchase or devise on site. In reality it is not the cloud or any other platform that determines how much of a security risk you are taking with […]

Everywhere you turn at the moment, the business news seems to be about drones. Excited people try to look serious as they wield the controls of a small space age appearing flying machine and make it bank and zoom for the cameras. The unavoidable mental imagine is of small kids flying model planes. Yet the […]

Wearable technology has begun to make a real impact on the way consumers shop for goods and services, but will also will change the way businesses train, empower and equip their employees. Here are some of the ways wearable technology has already begun changing the way business gets done and some predictions about the future […]

Most experts in the data security field agree that a data breach is more likely than not to happen to almost every company. Far from being a death knell to the business that experiences it, a loss or compromise of data is quite survivable. The way you and your IT and other departments react to […]

No new business today can operate without IT technology; the inconvenient truth is most new business owners are tyros when it comes to understanding how to integrate IT with their business’s operations. One area where knowledge is lacking and confusion reigns is that of protecting data from hackers. Today’s hackers are not the same as […]