A bouncing, color QR code pulled in 20 million new connections during last Sunday’s Super Bowl. What could be wrong with that? Plenty.
New tech’s debut as a tool in national elections hasn’t been a big success. Here are some reasons why and what other organizations can learn from the experience.
21822233 - vector mobile app development icon
Why should you worry if the government is tracking down illegal immigrants by using their cell phone data? Today it’s immigrants; tomorrow it could be Muslims. Someday, it could be you.
Who’s responsible to make sure your privacy is protected? You are. There a few small things you can do right now to take control. Happy Data Privacy Day.
Holiday scammers can take the Ho-Ho-Ho and turn it into Oh NO! These tips can help you navigate the holidays.
Has your business got some left over cash as the year comes to a close? Here are some ways you can make smart buying decisions on technology.
At the intersection of convenience and privacy assault is location data. And caught up in this tangled web of contradictions are individual users.
If your neighborhood was the target of thieves and criminals, you’d get an alarm system - or a dog. But even knowing our businesses are a target of cybercriminals, hackers and crackers, we are still not paying nearly enough attention. Why is that? We’ve got some thoughts.
Wi-Fi 6 made its debut under the radar last month as a feature of the new iPhone 11. It may be awhile before we can really take advantage of this new standard, but it’s a game changer.
Municipalities large and small have been victimized by ransomware in 2019. Some more than once. We can learn some important lessons from these cities’ experiences.
It’s IT’s job to learn how to support the business - not to teach employees all about IT.
Technology is not easier. Technology demands knowledge, expertise, and attention. Bad things happen when we believe slogans like “plug-and-play” and “set-it-and-forget-it.”
The death of email has been heralded several times. But it keeps hanging in there. Slack’s IPO brought the battle of fully formed collaborative tools to the forefront. Could this be the end for email?
Facebook and its platforms has become the defacto marketing system for many businesses. But is all the controversy, the disruption, public scrutiny, and anger getting to be too much? What will happen if we break up?
Fast streaming, cooler phones? Those are nothing compared to the many major ways 5G can change our society.
Technology is embedded in every aspect of life and work. Along with those advantages come significant privacy concerns, and the potential that technology and privacy cannot coexist. Can privacy survive in the 21st century?
Communicating while on business travel can be risky business. Travelers are often targeted by hackers even as they are forced to use open systems in hotels, airports, and coffee shops to communicate. One solution: secure VPN.
Failure is the best determinator of future success. There are a lot of more inspiring quotes on this subject than this, but the point is the same. To help us all learn from others’ mistakes, periodically I like to take a current event and dig into what we can learn from it. Enter Mark Begor, the CEO of Equifax.
Breaking the glass ceiling in the technology industry is important - for both women and girls and the industry itself. But in the future world of work, coding is not an end goal; it’s a jumping off point.
Community service is highly valued in the Upstate and we are home to thousands of local nonprofits, churches, educational institutions and local chapters of national organizations. But community members aren’t the only ones who highly value nonprofits. Hackers do too.
Vendor relationships are important. But they are also an security exposure – as many hacked corporations have learned. Managing vendor relationships from a security standpoint is a crucial piece of your cybersecurity puzzle.
One of the big reasons many system implementations fail is poor testing that gets the system off to a rocky start. Follow some best practices to ensure your testing smooths the road for a successful launch.
Jan. 28 is Data Privacy Day. Celebrate by checking out these five commons risks for both business and individuals. Up your security game for 2019.
The US again has called behind Europe and even parts of the development world in adapting to mobile payments. New rules from Visa could change that and make 2019 the year that moves us closer to cashless.
Are you spending too much money to keep old data at the ready? Answer four questions to see if cold storage (archiving) is a better (cheaper) practice.
We all hate email. Yet we are addicted - enslaved - by it. Get control of it and make it work for you. The best part: You already have the tool you need to do it on your computer.
A disaster recovery plan needs to be tested and re-tested. Here are 10 keys to running an effective tabletop test of your plan.
We’ve been dealing with cybersecurity for enough years now, yet our passwords our still weak, our procedures haven’t caught up with hackers’ skills, and our overall risk is greater. Why aren’t we getting any better at this?