1. Stuxnet (2010) When news of Stuxnet first broke in the summer of 2010, it was unlike anything most in the cybersecurity community had ever seen. Believed to be developed by American and Israeli intelligence agencies, the worm and its associated payloads displayed an unprecedented level of sophistication and precision….
Blog
Uninterrupted Connectivity: Not Just for Big Business Anymore
Last night my home Internet connection went down, along with what was apparently a decent subset of the greater Los Angeles area. While this was a minor inconvenience for me, it translated into real lost income for business owners. The first comment I saw when I checked downdetector.com, was a…
Slow Internet? (Maybe) Don’t Blame Your ISP
When it comes to customer satisfaction, or rather dissatisfaction, it’s hard to beat an Internet Service Provider. With government-sanctioned duopolies limiting any real competition in the vast majority of the United States, your local cable or phone company has little incentive to strive towards anything more than mediocrity. But while…
Small Business Saturday: Five Ways Technology Can Help You Compete with the Fortune 500
Note: we do not receive commissions or referral fees for any of the products or services mentioned in this post. Today is the eighth annual Small Business Saturday, and in addition to supporting your favorite entrepreneur or corner coffee shop, it’s worth reminding ourselves how much technology has changed…
How Wi-Fi Can Help You Optimize Staffing Levels
Last week the Wall Street Journal reported that many large retailers, after years of slashing staff in an effort to contain costs, are starting to realize they may have gone too far. While fewer workers obviously leads to lower labor costs, it can also result in missed opportunities for sales or…
Dangerous Guacamole or: Why You Should Stop Relying on Expensive Security Software to Protect Against Ransomware
If you’re a small business owner, Ransomware should be high on the list of things keeping you up at night. All it takes is one wrong click of the mouse and your company’s records, customer data, and systems are held captive, locked behind a gate of encryption the attacker…