Monitoring employees online. Is it right?

Monitoring employees online. Is it right?

Whether or not to monitor your employees’ computers can be a tricky decision. While part of you may think it’s unethical, you also may question if your staff are spending too much time on non-work related activities, and taking advantage of you in the process.

Save time with these 10 social media tools

Save time with these 10 social media tools

As a small business owner, you only have so many hours in the day, and managing your social media accounts is likely at the bottom of your to-do list. But while it can be easy to simply put off those social media updates, you know in the back of your mind your business can surely benefit from them.

BI is for small businesses too

BI is for small businesses too

Business Intelligence (BI) has conventionally been the preserve of big business, given the need for specialist knowledge meant hiring pricey experts was often the only way to leverage its value. But the rise of self-service BI tools has leveled the playing field, allowing small- and medium-sized businesses to get in on the game too.

The curse of Chimera ransomware

The curse of Chimera ransomware

There are numerous strains of malware out there, but one particularly unpleasant one is ransomware. While this malicious software has been around for some time, recently a newer, nastier upgrade was discovered. Posing a threat to businesses of all sizes, the program, called Chimera, has upped the ante when it comes to scaring its victims out of their hard-earned cash.

CryptoWall/Locker (Ransom Ware)

CryptoWall/Locker (Ransom Ware)

Viruses infecting computers has become a very common phenomenon, sooner or later it is going to happen, it’s not if, but when. Over time, the more devices that require the internet, the more variety of malware that will be developed.

This is why viruses such as CryptoWall (a variant of its predecessor CryptoLocker) thrive, the virus is pushed out in mass to everyone and everything in quantity and the most common is via email or infected websites looking for “Drive By” internet traffic.

Cyber threats and the finance sector

Cyber threats and the finance sector

The financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks that involved extortion, social-engineering and credential-stealing malware surged in 2015. This means that these institutions should strive to familiarize themselves with the threats and the agents behind them.

4 ways to manage your online image

4 ways to manage your online image

Not only has the 21st Century brought about vast technological advances, it has also enabled new ways for businesses to get their brand messages out to customers and unearthed a new-found necessity: online reputation management. With a multitude of platforms and tools out there, it has never been easier for customers to directly interact with brands and products.

How to be more productive in life and work

How to be more productive in life and work

Between your customers, vendors, employees and other moving parts of your organization, it can be difficult to find the time to focus on your business. On a daily basis, you likely have to deal with dozens of tasks, and oftentimes don’t finish them all.

How to use LinkedIn to create business value

How to use LinkedIn to create business value

LinkedIn is a highly useful site, but many small businesses simply don’t make the most of it. The problem is that most of the information out there, that SMBs try to model, is focused on tips and strategies for larger organizations. And these strategies are simply not as effective when applied to the SMB. So what can the small or medium-sized business do to actually gain value from their LinkedIn efforts? Here are few tips to get you started.

IT Security Policies you need to implement

IT Security Policies you need to implement

Most business owners have an employee handbook. But when it comes to the online security of their business, often times this portion is either not adequately addressed, or not addressed at all. However, with cyber crimes an ever increasing threat, and the fact that employee error is one of the most common causes of a security breach, it is incredibly vital that your staff is informed of your policies.