Live video: a free way to reach new customers

May 31st, 2016

Having direct access to customers is a gold mine for SMBs and with the increasing popularity of live video services it’s just a matter of deciding what to broadcast. The strategies for live broadcasting are very different than pre-recorded video and it’s important to reevaluate how you’ll present company information in this medium. Keep reading […]

How business continuity plans can fail

May 20th, 2016

Your service provider, who you have tasked with looking after your company’s IT, has kept your business up and running for the past 10 years. Usually, that kind of longevity in developing continuity plans has resulted to some providers overlooking or underestimating certain issues. Here are some of them. Over-optimistic testing The initial testing attempt […]

Are your site’s images hiding an attack?

May 17th, 2016

As more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now something you should be concerned about from a security standpoint. Let’s take a minute to […]

7 Twitter tactics to get more retweets

May 13th, 2016

Managing your company’s Twitter account can be tricky. You have a lot of brilliant things to say in under 140 characters but the problem is getting more eyes on your tweets. What’s worse is that there are other companies competing with you to grab that attention. So what can you do to get more people […]

Are you using this effective marketing tool?

May 3rd, 2016

There are many marketing techniques SMBs use to gain clients. Free information products, brochures, and press releases are just a few among many. But how do you know what’s most effective? It all comes down to looking at data and seeing for yourself what’s worked before. We’ve gone through the trouble of doing just that, […]

Understand these 4 types of hackers

April 28th, 2016

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you […]

Tips to get to 500+ LinkedIn connections

April 25th, 2016

Most people are still impressed when they see a LinkedIn profile with 500+ connections. It gives that person authority in their industry and shows they’re a valuable member of the business world. In other words, 500+ connections can help sell you and your business. So how can you reach this coveted number? Here are some […]

Boost staff productivity with mobile tech

April 18th, 2016

Most business owners are quick to think that utilizing mobile devices automatically leads to more productivity. Unfortunately, this is not always true. A poor mobile device policy can actually lead to burnout and see your employees become overwhelmed by technology. Here’s how to avoid these pitfalls and get the most out of mobile devices in […]

4 BYOD security risks you should address

April 13th, 2016

In the 21st century, personal computing is with us wherever we go. This is all thanks to the proliferation of mobile devices such as smartphones and tablets. These devices allow us to take work home with us. And, with bring your own device (BYOD) strategy, businesses have never been so productive. However, BYOD poses a […]

5 tips for using Facebook reactions

April 5th, 2016

Simply getting a ‘Like’ on your post is not enough anymore. It doesn’t give you any other useful data and you can’t immediately tell what people feel about your post. However, with Facebook reactions, you can be getting just what your company’s social media page needs. Reactions allow people to quickly express what they think […]