Entries by Hunter Smith

,

The Truth About Customer Experience

by Alex Rawson Ewan Duncan Conor Jones From the HBR September 2013 Issue Companies have long emphasized touch points—the many critical moments when customers interact with the organization and its offerings on their way to purchase and after. But the narrow focus on maximizing satisfaction at those moments can create a distorted picture, suggesting that […]

,

35 Interface Innovations that Rocked Our World

Interfaces are where humans touch technology. They provide smarter ways to use simple things and simpler ways to use smart things. Interfaces release the potential of complex systems and technologies to the users who need them. And every once in a while, they change everything. We believe user interfaces have been pivotal to some of […]

Week in Breach

Cybersecurity News: Dark Web ID’s Top Threats Top Source Hits: ID Theft Forums Top Compromise Type: Domain Top Industry: Manufacturing Top Employee Count: 11 – 50 Cybersecurity News: United States United States – Netsential https://securityaffairs.co/wordpress/104351/cyber-crime/st-engineering-maze-ransomware.html Exploit: Unauthorized Database Access Netsential: Web Development Firm Risk to Small Business: 1.272 = Extreme A security breach at this Texas-based web development company led to the […]

,

Understanding Customer Experience

by Andre Schwager    and Chris Meyer From the February 2007 Issue HBR.  Anyone who has signed up recently for cell phone service has faced a stern test in trying to figure out the cost of carry-forward minutes versus free calls within a network and how it compares with the cost of such services as push-to-talk, […]

Week in Breach

This week, accidental data exposure erodes brand reputation, ransomware disrupts operations, and insurers increase their scrutiny of cybersecurity policies.  Dark Web ID Trends: Top Source Hits: ID Theft Forums Top Compromise Type: Domain Top Industry: High-Tech & IT Top Employee Count: 11 – 50 United States – Edison Mail  https://threatpost.com/edison-mail-ios-bug-exposes-emails-to-strangers/155814/ Exploit: Coding error Edison Mail: Email application Risk to Small Business: 2.171 […]

COVID-19 Impact on U.S. Consumer Technology Spending

MARKETS AND TRENDS COVID-19 Impact on U.S. Consumer Technology Spending COVID-19’s impact on consumer spending is uneven. See why the previous 30 days saw increased spending and what to expect in the next 30 days with IDC’s David Myhrer. JUNE 3, 2020  5 MINS READ  Share on Facebook Share on Twitter SHARE In normal times, consumer attitudes, […]

Week in Breach

June 3rd, 2020 by Kevin Lancaster This week in The Week in Breach, slow breach responses put customers at risk, a malware attack undermines the benefits of shopping online, and a new study reveals that frequently resetting passwords is essential even if they haven’t been directly compromised. Dark Web ID Trends: Top Source Hits: ID Theft Forums Top […]

,

Are Your Documents Safe? Free yourself from security risks with our guide

Lots of things threaten the security of your print environment and the documents it touches. It’s especially challenging as you try to safely bridge the physical and digital worlds. Fortunately, you can take steps to protect your document information. The “Document and Endpoint Security Management” guide contains practical advice and useful checklists about all aspects of […]