10 Social Media Trends That Will Matter Most in 2019

 Danny Goodwin  January 16, 2019 A new year is a great time to reassess everything you’ve been doing and find ways to improve your social media marketing strategy. Like most digital marketing…

15 Questions Technical Hiring Managers Love To Ask In Interviews

, , ,
Laurence BradfordContributor  Careers I write about tech companies, careers, and in-demand skills. This article is more than 2 years old. Interviews are always stressful, but they’re less so when you know what to expect.…

Week in Breach

,
This week, an online store is wiped out by malware, a NZ retailer faces serious data exposure, and few employees report sufficient cybersecurity training.   Dark Web ID Trends: Top Source Hits: ID Theft Forums Top…

Customer Journey Mapping Is at the Heart of Digital Transformation

,
In collaboration with NTT DATA, Nov 04, 2015 Digital technologies such as analytics, mobility, social networks, cloud computing and the Internet of Things are making old ways of working redundant and forcing companies…

Why wouldn’t you add another security layer to your MS 365?

,
2FA Is a Simplified User Experience Two-factor authentication gives you that second layer of security beyond a password while still making it easier on the user, than MFA. 2FA Protects Against Unauthorized Access With the introduction of…

Week in Breach

Hi Brett,   Here is breach news to share with your customers!   This week, data breaches threaten future government contracts, PII is exposed online, and cybersecurity incidents are projected to reach…

Sales Management Training

,
BTA Sales Management Leadership Participant Quotes “Highly comprehensive program with resources and skills that will impact personal and team improvement. Excellent content and well presented.” Hunter McCarty – COO RJ Young Nashville,…

How to hack a printer. Diary of a bored hacker.

Printers gone mad December 5, 2018 One quiet evening, you suddenly hear a sound. It’s the printer in the next room, and it’s furiously printing something no one requested. You take a look and see that it’s printed a leaflet…

We just deployed multi-factor authentication at another Managed Services Client

,
SEPTEMBER 23RD, 2019 Quickly and Easily Secure Local Microsoft Windows Logins Administrators and users often have a lot of sensitive information stored in their Windows laptops and desktops or local machines. Even with the availability of cloud…

Two-factor authentication for Apple ID

How it works With two-factor authentication, your account can only be accessed on devices you trust, like your iPhone, iPad, Apple Watch, or Mac. When you want to sign in to a new device for the first time, you'll need…