December 2020

A Field Guide to Phishing Attacks

Despite the name being mildly amusing, phishing attacks are no laughing matter. These scams, in all their different forms, wreak havoc on businesses—ranking as the top breach threat in the 2020 edition of Verizon’s annual Data Breach Investigations Report, and successfully impacting 65 percent of United States organizations in 2019 as reported by Proofpoint’s 2020 State of the Phish Report. Avoiding them requires you to be able to spot them, so let’s go over the different varieties of phishing that can be encountered.

Social Media Is A Tool For Any Sized Business

Nowadays, social media companies have a lot of power and influence, which is part of the reason that so many of today’s largest businesses have adopted social media as a critical promotional tool. With the average person spending about two hours and 24 minutes on social media and messaging applications per day, this makes social media a clear opportunity for any sized business to embrace. Let’s consider a few ways this can be accomplished for these different businesses.

What Exactly is Software-as-a-Service?

Businesses have many problems they need to solve. With technology, the process typically starts with identifying a problem, researching solutions, and finding one that will successfully work to solve the problem. Traditionally, when dealing with technology, a company would procure the hardware and hire technicians to implement the solution and deploy the services needed. If they had to borrow money to do it, they would because the profits would presumably be more than the payments even with banks tacking on interest.