Blog

Ransomware adopting self-replication

2016June9_Security_AAlthough some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible risk of infection.

VoIP: 5 security tips for SMBs

2016May23_VoIP_AAs SMBs continue their steady transition away from traditional telephony services in favor of VoIP, threats of cybercrime and fraud are more common than ever before. Risks to VoIP systems are distinctly unique from those posed to your other networks and understanding how to combat them is critical.

Get more retweets with these Twitter tactics

2016May13_SocialMedia_AAre your tweets not getting enough exposure? With so many other social media campaigns out there, it can be tricky to get the attention of followers in Twitter. While posting regularly and writing bold headlines are important in grabbing the audience’s attention, there are other Twitter tactics that you should be employing in order to get the most retweets.

Empower work at home employees with VoIP

2016May9_VoIP_AAs a business owner, it’s important to raise your company’s morale to be more productive. But you can’t just keep throwing office parties everyday of the year. Thanks to advancements in VoIP technologies, you can offer a better way to keep your employee’s spirits high by allowing them to work from home.

The age-old marketing tool you’ve forgotten

2016May3_BusinessIntelligence_AFrom free information products such as ebooks to brochures and email campaigns, today’s marketers have a wealth of tools and tactics at their disposal. While content marketing and social media garner most of the attention in the marketing world, it’s easy to forget about tried and true techniques that are as effective today as they were twenty years ago.