Most of us fall into one of four technology types. From a geek to a grumpy, it's important to know what type all the key members of your team are. And, more importantly, what you are.
A major data breach in South Carolina has businesses and individuals scrambling. No matter how small your business may be, you have information of your own and of your clients that needs to be secured. These five steps are a good start that everyone can implement.
Technology is not a destination, it's a bus. We get on it and ride to the destination -- a business goal. Want better results from your tech strategy? Don't have one. Have a business strategy that employes technology. We offer four often discussed, but less often implemented, keys to making the trip worthwhile.
The explosion of mobile devices is driving more and more businesses to social media. But make sure you have your communication basics down first, before you worry about where you're going to deliver them.
Technology researchers are looking for new ways to secure your online data. But as more and more of our identity is stored online, users need to take some proactive steps to protect and, potentially, recreate critical information.