Blog

April 11th, 2014

Security_Apr11_BThe Internet is an amazing thing, but being so big and accessed by so many people, it is never really 100% secure. There are always security issues being uncovered that could put your business and systems at risk. One of the latest flaws is possibly one of the biggest to be uncovered in years and could affect nearly every person and company on the Internet. Codenamed Heartbleed, this bug makes stealing data and viewing secure communication incredibly easy.

Background info about secure transmission of information on the Web

Most sites on the Internet rely on Secure Sockets Layer (SSL) technology to ensure that information is transmitted securely from a computer to server. SSL and the slightly older Transport Layer Security (TLS) are the main technology used to essentially verify that the site you are trying to access is indeed that site, and not a fake one which could contain malware or any other form of security threat. They essentially ensure that the keys needed to confirm that a site is legitimate and communication can be securely exchanged.
Read more.
Topic Security
April 10th, 2014

BusinessValue_Apr07_BWhen it comes to Web design many business owners and managers work with a Web designer or developer. These Web experts often use terms that you may not be familiar with and which in essence sound like another language. This can make it difficult to communicate and to ultimately get your point across to achieve the website you want. To make dialogue easier, it might be helpful to learn some of the common Web design terms.
Read more.

April 9th, 2014

SocialMedia_April07_BAre you searching for tools that can help you create striking visuals for your social media campaign? Let’s admit it, not everyone is a Photoshop expert, and for many of us, it can be really challenging and perhaps even intimidating to use. Furthermore, the cost of a program or designer may be out of your budget. Luckily, there are other options that could really help.

In this day and age where compelling visuals are possible online, it is extremely important to learn how to create attractive visuals to aid your social media marketing campaigns. You at least need a working knowledge of how to enhance your photos and make them more attention-grabbing. There are a number of free or highly affordable tools out there that can help you do just that.
Read more.

Topic Social Media
April 4th, 2014

iPad_March02_BSince the launch of the iPad one of the most commonly requested business oriented apps has been Microsoft Office. While there are apps that can open and edit various Office apps on the iPad they often lack the finish and overall functionality/formatting of official Office apps. Some users were starting to lose hope that they would ever see iPad specific Office apps. However, Microsoft has delivered their wish with recently released Office apps that are optimized specifically for the iPad.

Wait isn't that Microsoft Office Mobile?

Earlier last year Microsoft introduced Office Mobile for Office 365 subscribers. With this app users could access, create, and edit Office documents on a mobile device. The only issue with this app is that it is optimized for smaller screens e.g., the iPhone. While it is possible to use it on your iPad, optimized apps specifically for the iPad have until now been lacking.
Read more.
Topic iPad
April 4th, 2014

Security_March31_BA malware infection is an attack that you do not want invading your business systems. Malicious software can often make its way on computers without your knowledge, causing various disturbances. What’s even worse, is that vital information saved on your computer or data that you access online could be stolen. Computers must have proper protection. In the event that malware infection is detected an immediate response is required.

Signs of a malware infection

Before proceeding with the steps on how to respond to malware infections, we first need to learn about the signs and symptoms of a malware infection. These include:
  • Several pop-ups appear even when not browsing the Web.
  • Unusual slowness of the computer and Internet connection.
  • System hangs or freezes.
  • Corrupted programs.
  • Antivirus is disabled.
  • E-mails sent to or from your account which you did not send.
  • High network activity, even when not using large programs or accessing huge data.
  • Redirected access to some sites.

How to respond to a malware infection

In case you experience any of these symptoms, the first thing to do is to ensure that your antivirus and antispyware program is updated. This is to make sure that they detect the latest known threats on their database. You should then run scans to see if an infection is detected. If it is, the programs usually have a way to remove the infection. You then need to follow the steps the program recommends.
Read more.
Topic Security