Blog / Reports / Resources

Have you heard of Bad Rabbit?

Have you heard of Bad Rabbit?

Get to Know the Fast-Spreading Malware Threat Before It Gets to Know You Earlier this year, a ransomware variant called Petya spread across North America hitting corporate giants like Merck and FedEx. The virus is so serious that some affected companies were faced...

read more
How The Three Titans Are Addressing Wi-Fi Vulnerability

How The Three Titans Are Addressing Wi-Fi Vulnerability

The three Titans, Google, Microsoft and Apple address security issues with KRACK.   Just when everyone thought Wi-Fi was safe, that illusion was recently shattered.  Security researcher Mathy Vanhoef has discovered a vulnerability that he’s calling “KRACK.”  The flaw...

read more
Malicious Misuse:  Learning from the DocuSign Breach  

Malicious Misuse:  Learning from the DocuSign Breach  

How to prevent suffering from malicious misuse of your data – a risk revealed by the recent breach at DocuSign, where hackers impersonated the electronic document company to distribute malware. The DocuSign episode is an example of a multi-stage threat.  In the...

read more
The Non-Profit Partnership With Information Technology

The Non-Profit Partnership With Information Technology

Is your non-profit relying on the limited tech skills of a volunteer or employee who has other full-time duties in your organization?  Discover the benefits of, and tips for, outsourcing your IT. Tips for Outsourcing Tech for Your Non-Profit There tends to be thinking...

read more
The New Approach by Sophisticated Cybercriminals

The New Approach by Sophisticated Cybercriminals

Discover the new enterprise approach used by cybercriminals and what you can do to defend your company against these attacks.   The New Approach by Sophisticated Cybercriminals Battling the dark side of cybercriminals has been a challenge for over a decade.  Their...

read more
Saving Content to Read Later

Saving Content to Read Later

:Using an App that Actually Helps You Read that Article Later Saving articles to read later is something we do; we save.  But reading the articles we save isn’t something we do as often.  The reason:  organization, or lack thereof.  But with organization comes...

read more
How to See Stars in Google Search  

How to See Stars in Google Search  

By following these simple steps, you can make your website stand out from the crowd with shining star ratings in Google’s search results.   Have you ever tried searching for your own business on Google?  If your business has a website, you likely pay attention...

read more
Is Your Business Prepared to Recover From a Cyber Attack?

Is Your Business Prepared to Recover From a Cyber Attack?

Half of all small businesses suffered a cyber attack in the last year.  Is your business ready to recover?  How well is your business prepared to recover quickly from a cyber attack?  A recent Ponemon study reported that half of all small businesses had been targeted...

read more
Moving Your Accounting Firm to the Cloud?

Moving Your Accounting Firm to the Cloud?

Accounting firms that move into the cloud become more efficient, more productive, more mobile, and, perhaps more importantly, more profitable. Here are the clear benefits of what to expect when you move your firm into the cloud.   What’s the perfect setup for a...

read more
Cybersecurity Tips for Non-Profits  

Cybersecurity Tips for Non-Profits  

Is Your Charitable Organization at Risk? If tomorrow’s headlines read your non-profit organization’s data and donor info was breached, what would be the ramifications?  Are you taking enough appropriate steps to stop cybersecurity threats? Is Your...

read more
How to Score the Coveted Google Snippet Spot 

How to Score the Coveted Google Snippet Spot 

You have probably seen and benefited from a Google featured snippet.  It’s the box at the top of the search results which contain the exact information you need.  Question is, how can your business score this great marketing opportunity? Instead of just typing a few...

read more
All You Need to Know About WiFi Krack Attacks

All You Need to Know About WiFi Krack Attacks

Krack Attacks:  You use WPA2 to access the internet every day, and you could be vulnerable to a Krack Attack.   Virtually all modern WiFi networks employ WPA2 as a security protocol.  A couple of months ago, a security researcher named Mathy Vanhoef discovered an...

read more
Working Faster and Better in Microsoft Excel

Working Faster and Better in Microsoft Excel

Microsoft Excel is a powerful tool, and using a few shortcuts and tips can make your work move faster.  Today we’ll look at a few Excel tools to improve your experience in working with data. Microsoft Excel is a powerful tool for analyzing data, and using a few...

read more
Empowering PowerPoint:  A Closer Look at New Features  

Empowering PowerPoint:  A Closer Look at New Features  

New PowerPoint 2016 features add dynamic effects, more design options, and professional results to presentations.   Recently, Microsoft has upped its game when it comes to PowerPoint.  With the introduction of several powerful new tools, PowerPoint now puts more...

read more
10 Reasons to Practice Cloud Accounting

10 Reasons to Practice Cloud Accounting

More businesses move to the cloud each day.  Learn how offering cloud accounting services can send your practice to new heights.   With the increasing availability of cloud technology, more and more accounting firms are floating up onto the cloud, almost as if they...

read more
Kaspersky on the Downward Slide After Dangerous Hack

Kaspersky on the Downward Slide After Dangerous Hack

Whether or not you believe Kaspersky was an active partner in the recent malicious hack of NSA documents, things aren’t looking good for the security giant.   Kaspersky is in the antivirus business, and business isn’t good these days.  The Russian-owned...

read more
Have You Been “KRACKed?”  Important–Read On!

Have You Been “KRACKed?”  Important–Read On!

KRACK is a bug that can affect any device with Wi-Fi capabilities. However, the news isn’t all bad. There are silver linings that come from any catastrophe.   Cybercriminals are trying to get your devices” hooked on” KRACK (the Key Reinstallation...

read more
8 Steps to Developing a Solid Business Continuity Plan

8 Steps to Developing a Solid Business Continuity Plan

In business, one of your greatest assets is foresight.  Put your planning potential to good use with a solid business continuity plan to ensure your company survives any incident, big or small.   When it comes to business, we have to foresee an entire range of...

read more
Mark My Word:  12 Great Tips for Mastering Microsoft Word

Mark My Word:  12 Great Tips for Mastering Microsoft Word

Find great Microsoft Word 2016 tips for better collaboration, text management and photo treatment to get the most out of the program.  Are you looking to leverage all of the best features in the latest release of the popular word processing program Microsoft Word?...

read more
Excel Tips to Take You From Beginner to Rock Star

Excel Tips to Take You From Beginner to Rock Star

Want to become an Excel rock star?  These tips will provide you with the knowledge you need to master this powerful productivity tool and become the go-to Excel expert in your office.   There are people in this world who are able to make spreadsheets practically sing:...

read more
Why We Need More Cybersecurity Specializing Law Firms  

Why We Need More Cybersecurity Specializing Law Firms  

Amazingly, in spite of the ever-increasing need for such, there are very few law firms right now that specialize in cybersecurity.  This doesn’t deny that many law firms are more than willing to take on cybersecurity cases when the need arises; nor does it deny that...

read more
Social Media 101:  LinkedIn Replicating Snapchat?

Social Media 101: LinkedIn Replicating Snapchat?

Jazz Up Boring Convention Photos with Snapchat-Style Filters from LinkedIn LinkedIn has long been the bastion of boring, in a way — with professional networking being the main order of business.  Will the new geofilters add a spicy layer to the social media...

read more
How to Keep Kids Safe Online

How to Keep Kids Safe Online

The Internet has the potential to cause harm to your children and teens, but there aren’t rules and restrictions governing it like we have with other things in our society.  The Internet is like the Wild West—There are very few controls, and it’s not private.  So how...

read more
Locked Out Of Your Mac?

Locked Out Of Your Mac?

If you’ve purchased a Mac expecting to never have to be concerned with malware or hacking, think again!  A recent exploit is targeting Mac users.  The good news?  It’s preventable. Mac users have long touted the fact that Apple computers are much less...

read more
How Much Do Multiple Monitors Boost Productivity?  

How Much Do Multiple Monitors Boost Productivity?  

While some feel more isn’t always better, it actually is when it comes to monitors.  Some feel that paying for multiple monitors for employees is just a waste of space and money.  That’s a myth.  According to the report in the NY Times by a Jon Peddie Research survey,...

read more