Blog

SMBs Key to Local Economic Recoveries… through Ads? August PF 2010

Small Business Paving the Road to Recovery The strength of American industry began with local businesses that thrived and grew to national levels. But during current economic struggles, it’s not the national or even international growth monsters that the American public looks toward for help in recovery. It’s the Small Business. You know them — they’re everywhere, from local coffee shops to print houses; from small technology firms to legal and tax advisors. It’s these local economy cornerstones that will ultimately assist in America’s recovery from rough roads. At least, that’s what Irving, CA, based ad-firm WebVisible is stating in their recently released Q2 report, entitled: State of Small Business Online Advertising Q2 2010.

Technology Increases Small Business Profitability – PF July 2010

During times of economic struggle, most small businesses end up making cuts and changes to keep their businesses in the green. From laying off staff to decreasing business travel, reducing marketing efforts and ending bonuses and raises temporarily – there are a variety of ways small businesses look to cut their expenses.

Facebook – Simple Steps for Safety at Home and Work- PF May 2010

In this ever-advancing age of real-time social networking, the threats to sensitive personal information keep growing. Cyber-thieves now access all the daily sites you use, just looking for that slip of info that will unlock bank accounts, passwords, and sometimes even your house!

Your Copy Machine: A Serious Security Risk?

It seems that even the most innocuous machines in the workplace can serve as a security threat to companies. According to this report from CBS News, many office copiers save the images they copy on a dedicated hard disk installed inside them. This means that everything from mundane memos to your most sensitive information such as financial statements and contracts are stored – and could potentially extracted. So the next time you dispose of a copy machine, if you’re not sure what’s stored on it and how to get it off – give us a call to help out. To see the news report, watch this video.

Thwarting Insider Threats – PF May 2010

The greatest information security threat facing your organization is in your office right now. It has the ability to bypass the physical and logical controls you’ve put in place to protect the perimeter of your network and has already obtained credentials to access a significant portion of your infrastructure. What is this threat? It’s the often underestimated insider threat — the risk that your users will violate the trust you’ve placed in them to conduct malicious activity on your network.