Blog

The Top 10 Tech Trends for 2015

The New Year is upon us, which means we all get a fresh opportunity to consider what’s important for the next 12 months. In the small to medium-sized business world, technology routinely tops that list — you can’t work well without technology, and technology that doesn’t work well will only hold you back.

What 2014 Holiday Shopping Statistics Mean for the Push Toward Mobility

As many news outlets have reported over the last few weeks, the major trend in e-commerce this year has come from mobile device use. Over the three-day period encompassing Thanksgiving Day, Black Friday, and Cyber Monday:

•    33% of Thanksgiving Day sales came from mobile devices, as did 52% of online shopping traffic

•    Mobile drove 50% of all Black Friday shopping traffic, up from 40% from last year

•    Mobile sales accounted for 28% of all Black Friday online sales, up from 22% last year

•    41% of Cyber Monday traffic came from mobile devices, up from 30% in 2013

•    22% of all Cyber Monday sales came from mobile devices

•    46% of emails on Cyber Monday were opened on mobile devices

What do all these numbers mean for the average small to medium-sized business owner? A January 2014 Pew Research Internet Project study found that 90% of North American adults have a cell phone; 58% have a smartphone; 32% have an e-reader; and 42% have a tablet.

4 Ways to Fend Off CryptoWall, the Latest Ransomware Virus Threat

A new virus is flexing its corrupting muscle on computers and users worldwide. CryptoWall first appeared in February, but attention surrounding the ransomware spiked this summer, when researches at Dell SecureWorks reported on it. In October, the UK Register revealed that 830,000 victims had been infected — a 25% increase since August.

10 Ways to Protect Your Business from Digital Retaliation and Employee Error

Lost amidst the recent avalanche of news concerning data breaches, system insecurities, and other external cyberattacks was a joint Department of Homeland Security/FBI alert about insider digital retaliation. Defined as the destruction of data, theft of proprietary software, removal of customer information, restriction of access, and/or extortion by disgruntled current or former employees, federal agents say such instances have spiked lately.

Why Strong Network Security Is a Must in the Wake of the Shellshock Bug

 

In late September, cybersecurity experts discovered the latest in a long string of software bugs that threatened millions of operating systems, including Mac computers and Android smartphones. The bug, dubbed Shellshock by researchers from Kaspersky Labs and other firms, was initially compared to the Heartbleed vulnerability, only far worse — while Heartbleed stole passwords, Shellshock was able to take over entire machines via remote code execution.