Search This Blog

Saturday, April 30, 2016

10 Tips for Online and Content Marketing

Marketing a business online is no simple task. There’s a lot that goes into it. And members of our small business community have plenty of experience dealing with online and content marketing. Here are some of their top tips for online and content marketing.



10 Tips for Online and Content Marketing

Friday, April 29, 2016

Using The Best Technology For Small Business Growth

All business owners begin their venture with a focus on growth.
With the rapid advances in technology, new and effective opportunities are opening up for businesses to quicken their progress. Small businesses, nowadays, are increasingly tapping into the many resources that technology has rendered accessible. This is because, technology can provide a competitive advantage to businesses worldwide.


Using The Best Technology For Small Business Growth

Security Bulletin: Steps you should take to fix a Java SE security risk on your computer

Welcome to a very unusual cybersecurity article! Why is it unusual? The title of this Security Bulletinand most of its content was provided by Oracle, the maker of the Java computer programming language. In fact, ESET is publishing this information on We Live Security at the request of Oracle. And Oracle made the request because it was ordered to do so by the US Federal Trade Commission (FTC).
That’s right the US government can require a US company (in this case Oracle) to distribute quite specific technical information to the public, if it is deemed necessary to the cybersecurity of consumers and the country. While ESET was under no legal obligation to comply with Oracle’s request, it was decided that doing so would help to improve cybersecurity for many consumers. You can learn more about how this all came about in a separate article here.


Security Bulletin: Steps you should take to fix a Java SE security risk on your computer

Twitter now calls itself a news app, not a social network (CNET Update)

Deploying Your Watson Application on Bluemix in 4 Easy Steps

Periscope Adds New Feature, New Video Streaming Service Announced

Fans of livestreaming have received some welcome news. Not only has Periscope started testing a new doodle feature, but a new platform is beginning to gain traction as well, giving live streamers even more options.
Read on for more small business headlines like these in our weekly Small Business Trends news and information roundup.


Periscope Adds New Feature, New Video Streaming Service Announced

Interview With Ciara Viehweg of Facebook

Small businesses are leveraging Facebook more and more to engage their customers and prospects. A growing number of SMBs are posting videos on Facebook, and millions of them are advertising on the platform. And small businesses are investing more in Instagram’s advertising platform as well, which leverages Facebook’s targeting tools to help them connect with the right prospective audience.
With next being National Small Business Week, Facebook is holding a small business event in Atlanta, GA. We caught up with Ciara Viehweg of Facebook as she shares with us how small businesses are leveraging Facebook’s platform to build deeper relationships with customers and prospects to grow their businesses. Ciara, who is part of Facebook’s SMB Community Engagement Team, also shares a few tools SMBs can use to get the most out of Facebook’s platform from a customer engagement perspective.


Interview With Ciara Viehweg of Facebook

Launch Your Own Movie Channel With Unreel.me Video Streaming

YouTube’s got some new competition.
Social video streaming company Unreel Entertainment has launched a new platform called Unreel.me, which provides all the tools businesses may need to instantly launch their unique, rich online video hubs. Not only that, they can monetize the content they create.


Launch Your Own Movie Channel With Unreel.me Video Streaming

Cybercriminals ‘increasingly relying upon ransomware’

Ransomware is being increasingly relied upon in cyberattacks, according to Verizon’s latest Data Breach Investigations Report.
Over the last 12 months, there has been a 16% increase in ransomware attacks, the authors of paper stated.


Cybercriminals ‘increasingly relying upon ransomware’

How To Optimize Social Media Contests

To be successful in a social media campaign, you need to have a mechanism for audience growth. Most of your tactics, such as posting new content regularly and engaging with your audience on a regular basis, will carry this effect to some degree, but if you’re interested in scaling your strategy up, or if your traditional methods have led you to a plateau, you’ll need something stronger to earn new followers.
One of the best ways to accomplish this are social media contests, which offer up a prize or reward in exchange for some audience participation. Contests are especially powerful because they have a tangible incentive, they include a natural means of engagement, and they’re highly shareable, thus making them highly visible and capable of yielding a strong ROI.


How To Optimize Social Media Contests

NetSuite is the Fastest Growing Top 10 Financial Management System Globally for the Third Straight Year Based on Calculations of Gartner Data

NetSuite is the Only Pure Cloud FMS Vendor in Top 15
NetSuite Grows Both Revenue and Market Share


NetSuite is the Fastest Growing Top 10 Financial Management System Globally for the Third Straight Year Based on Calculations of Gartner Data

NetSuite Announces First Quarter 2016 Financial Results

NetSuite Announces First Quarter 2016 Financial Results

Outbrain Launches Outbrain For Chat Content Bots

The online content discovery platform Outbrain has launched Outbrain for Chat, a new service that will help online publishers to launch content bots or applications across leading Messaging platforms. You may not have heard of Outbrain yet, but you most likely have come across some of their work online.
Some of those alluring links that you come across at the bottom of websites like New York Post, Sky News, The Telegraph and CNN are powered by Outbrain and are tailored to attract individuals using Outbrain’s behavioral analytics.


Outbrain Launches Outbrain For Chat Content Bots

43 Percent of Cyber Attacks Target Small Business

Cyber crime is on the rise and small businesses are increasingly becoming the target of hackers.
New data from Symantec’s 2016 Internet Security Threat Report shows that small businesses have become a big target for phishers. Last year, phishing campaignstargeted small businesses (PDF) 43 percent of the time. That’s up 9 percent over 2014 and a stark contrast to the mere 18 percent of attacks that focused on small businesses in 2011.


43 Percent of Cyber Attacks Target Small Business

Burgeoning Internet of Medical Things make you uneasy? It should | Fortinet Blog

Twenty billion new connected devices in the coming year. The Internet of Medical Things (IoMT) is growing massively.
And so are the threats.


Burgeoning Internet of Medical Things make you uneasy? It should | Fortinet Blog

Thursday, April 28, 2016

Ransomware is everywhere, but even black hats make mistakes

Ransomware is everywhere. At least that might be the impression left by a seemingly endless stream of news reports on recent cyberattacks. Well, there were several (good) reasons why criminals have made it all the way to the front page.
First, the targets they’ve chosen for their malevolent activities. Such as hospitals on both coasts of the US, which were unable to protect patient data. People’s lives and health being put at risk has forced some facilities to pay thousands of dollars to cybercriminals.


Ransomware is everywhere, but even black hats make mistakes

Mellanox Technologies, Ltd. to Present at Upcoming Investor Conferences (NASDAQ:MLNX)

Mellanox Technologies, Ltd. to Present at Upcoming Investor Conferences (NASDAQ:MLNX)

Say goodbye to cyber stresses in the workplace

Are you worried about cybercrime? Does the idea of a data breach keep you up at night? Do you suffer from disquiet at the thought of your employees downloading malicious software?
Then you’re not alone. In recent years, as the workplace has become more digital in scope, such concerns have become increasingly commonplace. This is especially true if you occupy a senior position within your company – not only are you more acutely aware of the threats posed, but you also appreciate that ultimate responsibility lies with you.


Say goodbye to cyber stresses in the workplace

Malware found at a German nuclear power plant

Malware has been found on a computer at Gundremmingen nuclear power plant in Germany, it has been revealed.
Reuters reported that RWE, the electric utilities company responsible for operating the plant, does not consider it a threat as the infected computer is not connected to the internet.


Malware found at a German nuclear power plant

AVT-PR-Avnet, Inc. Reports Third Quarter Fiscal Year 2016 Results

AVT-PR-Avnet, Inc. Reports Third Quarter Fiscal Year 2016 Results: Earnings Per Share in Line with ExpectationsStrong Cash

Flow from Operations









PHOENIX--(BUSINESS WIRE)--

Avnet, Inc....

Adaptive Medias Merging With AdSupply

When one company acquires or merges with another, one of the goals is to improve its current product line while seamlessly integrating the solutions from the new organization. In the case of AdSupply, which is acquiring Adaptive Medias, the fit seems to be perfect.



Adaptive Medias Merging With AdSupply

Dell is the number one provider of secure thin client solutions for 2015. | Dell

Dell has confirmed its position as the number one provider of secure thin client solutions, with the latest IDC figures placing Dell as the leading supplier of zero clients and ThinOS solutions for 2015[1]. The results reflect the increasing focus businesses are placing on installing secure thin client solutions and affirms the continued investment Dell is making in the enhancement of security features across its entire Wyse thin client portfolio.



Dell is the number one provider of secure thin client solutions for 2015. | Dell

Wednesday, April 27, 2016

Google Home Service Ads Expand, Adds Electricians and HVAC

After Google’s phenomenal success in connecting home services owners to local residents in the San Francisco Bay Area last year, it has now taken a new step in this direction to include Electricians and HVAC Services in its Google Home Service Ads Program.
In 2015, Google launched a new format for its Home Service Ads (HSAs) wherein users, in a matter of minutes, were able to locate local home services professionals like plumbers, locksmiths, and home cleaners by just keying in their ZIP codes on Google. With that info, Google pulls up a list of local service providers.


Google Home Service Ads Expand, Adds Electricians and HVAC

Florida Hospital Achieves Quality Improvements Plus $72.5M in Appropriate Reimbursement with Nuance CDI

Adventist Health System affiliated hospitals to implement enhanced CDI solution embedded with Cerner's clinical and financial health IT system



Florida Hospital Achieves Quality Improvements Plus $72.5M in Appropriate Reimbursement with Nuance CDI

Klevu is a Self-Learning Ecommerce Site Search Tool

Klevu, a Finnish startup founded in 2013, is an ecommerce site search tool for websites that incorporates a variety of innovative techniques designed to help shoppers find what they are looking for more quickly and accurately.
Klevu integrates with platforms such as Magento and Shopify and has a starting cost of $19 per month, putting it well within the reach of smaller online merchants.


Klevu is a Self-Learning Ecommerce Site Search Tool

Malware ‘used as part of a wider toolkit’ in Bangladesh Bank attack

Malware used by cybercriminals to carry out one of the biggest cyberheists in history is thought to have been “part of a wider attack toolkit”, according to a BAE Systems’ security researcher.
In a company blog, Sergei Shevchenko said that the tools used in February’s attack on Bangladesh Bank, which saw criminals walk away with $81 million, “could feasibly be used for similar attacks in the future”.


Malware ‘used as part of a wider toolkit’ in Bangladesh Bank attack

The perimeter is everywhere (so where is your data really?)

It’s hard to protect what you don’t understand. It’s also hard to protect data if you don’t know where it is. If your data has silently been mirrored to a data center overseas while migrating its way around the cloud, how would you know? How would you really be able either to protect it or know with certainty how secure it is? This is the problem with converging data – assuming it will work and be secure, and still interoperate and behave.
If you don’t know where your data is, you may not have much luck protecting it legally, or really knowing how that might happen across different overseas jurisdictions if you run into trouble. In that sense, it’s very hard nowadays to understand what’s really happening in the cloud; you just hope for the best – security-wise.


The perimeter is everywhere (so where is your data really?)

Spotlight: PeeqSee Offers an Interactive Social App

There’s no shortage of social media platforms for people to choose from these days. So it can be difficult to get one to stand out from the rest. That’s whyPeeqSee focuses on creating an experience that’s truly interactive. Read more about the app in this week’s Small Business Spotlight.



Spotlight: PeeqSee Offers an Interactive Social App

Companies fear data breaches caused by compromised credentials

Data breaches are being linked mostly to compromised credentials, a Cloud Security Alliance (CSA) report has found.
Surveyed security professionals indicated that compromised credentials are the most common cause of past data breaches, as well as the most likely cause of possible data breaches in future.


Companies fear data breaches caused by compromised credentials

Ransomware and the Internet of Things

We all know that ransomware has become a huge problem, hitting businesses and consumers alike as it encrypts valuable data and attempting to extort sometimes large sums of money for safe recovery.
But at least we can console ourselves with one thought: the threat has been confined to encrypting data on computers and web servers, or locking users out of their systems until a ransom has been paid.


Ransomware and the Internet of Things

The Basic Concepts Of SEO Explained to Beginners

While SEO (search engine optimization) is not rocket science or brain surgery, it certainly isn’t the easiest paradigm to understand, especially to someone who doesn’t have a background in the internet or technology.
Whether it’s the way words sound (meta data optimization) or a particularly technical aspect of SEO (like schema markup), I tend to encounter confusion quite often with those customers who are new to the concepts of SEO.  In order to guard against a customer’s confusion or worse, feeling inferior, a successful sales rep has to create a bridge between the customer and SEO in order to grow a clear understanding of the practices of a successful SEO campaign.


The Basic Concepts Of SEO Explained to Beginners

Dell Networking for Future Ready Campus and Data Center | Dell

Dell Networking today introduced new capabilities for campus and data center environments, including the launch of new cloud-managed wired and wireless solutions powered by Dell and Aerohive, Operating System 10 milestones and in-rack platforms for the data center.



Dell Networking for Future Ready Campus and Data Center | Dell

Tuesday, April 26, 2016

Data privacy and data protection: US law and legislation white paper

Data privacy laws and legislation are in the news these days for a variety of reasons, and in a variety of countries. For example, a heated debate about data privacy is currently going on between the European Union (EU) and the United States (US) over something called the Privacy Shield. This is a new ‘Safe Harbor’ arrangement intended to maintain ‘transatlantic data flows’ by assuring Europeans that their privacy rights will not be negatively impacted if their data is transferred to the US (for example, when Europeans do business with American companies).



Data privacy and data protection: US law and legislation white paper

Apple's iPhone sales sink for the first time ever last quarter - Apr. 26, 2016

Apple just announced its worst quarter in over a decade.



On Tuesday afternoon, Apple reported that its sales and profit both fell last quarter -- a rarity for a company that has been growing at a rapid pace, even as it has become the largest technology company on the planet.



Apple's iPhone sales sink for the first time ever last quarter - Apr. 26, 2016

KLA-Tencor Reports Fiscal 2016 Third Quarter Results (NASDAQ:KLAC)

KLA-Tencor Reports Fiscal 2016 Third Quarter Results (NASDAQ:KLAC)

Securing the New Enterprise | Fortinet Blog

Organizations are undergoing dramatic change, driven by their transformation to a digital business model and the resulting exponential increase in data, devices, users, applications, and transactions flooding their networks through the cloud. Managing, processing, and servicing this information is business critical, and it is putting a huge strain on budgets and IT resources.



Securing the New Enterprise | Fortinet Blog

Uninstall QuickTime from Windows Computers Immediately

As much as we all love the digital world we currently live in, the issue of security is an annoyance we could all do without.
One of the latest security risks was announced by the Department of Homeland Security’s United States Computer Emergency Readiness Team (CERT) with an alert urging customers to uninstall QuickTime from Windows.


Uninstall QuickTime from Windows Computers Immediately

BeautifulPeople.com experiences data breach: 1m affected

The personal data of around 1.1 million people could be sold off on the black market after it was revealed that the dating website BeautifulPeople.com had experienced a data breach.
The company describes its service as “online dating for beautiful people only”, as aspiring members must first win approval from the app’s accepted users before being paired up with like-minded individuals.


BeautifulPeople.com experiences data breach: 1m affected

New Poison Ivy Activity Targeting Myanmar, Asian Countries

New Poison Ivy Activity Targeting Myanmar, Asian Countries

Anchor Audio App Broadcasts to Followers Via iPhone

Launched back in February 2016, the Anchor audio app introduced an exciting new medium to the world of social media – your own voice.
That’s right. Using the Anchor audio app, you can record a short segment and then share it with the world. The world can then talk back, using recordings called replies. In turn, you, or anyone else, can reply to replies in an interactive conversation.


Anchor Audio App Broadcasts to Followers Via iPhone

NetSuite Receives 5-Star Rating in CRN’s 2016 Partner Program Guide

Annual best channel partner programs guide recognizes NetSuite, the #1 Cloud ERP, for Sixth Consecutive Year



NetSuite Receives 5-Star Rating in CRN’s 2016 Partner Program Guide

Insider threats: A persistent and widespread problem

When it comes to cybercrime, a lot of the focus is centered on external threats and on the individuals who actively attempt to cause harm and damage, whether by infecting a computer system withmalware or through the encryption of files for reasons of extortion.
This attention understandable. Threats posed by cybercriminals to organizations is great, so much so that many consider their unlawful activities to be the natural evolution of so-called traditional crimes – it is simply a digital and online version of what went on before. Others go so far as to describe it as a “21st century phenomenon which won’t go away”.


Insider threats: A persistent and widespread problem

Shopify Acquisition of Kit CRM Introduces Conversational Commerce

Shopify has just recently announced that it is all set to acquire Kit CRM, a virtual marketing assistant that leverages messaging to help businesses market their online stores. The acquisition of Kit CRM will will add yet another feather in the crown of conversational commerce.



Shopify Acquisition of Kit CRM Introduces Conversational Commerce

Innovation Insights - 300 Patents and Counting... | Fortinet Blog

It’s been said that the definition of technology innovation is creating significant positive change. This month marks a milestone in Fortinet’s efforts to create an entire culture dedicated to this sort of entrepreneurial innovation, with its 300th patent being issued worldwide - and over 250 additional patent applications pending! This is over five times the number of patented cybersecurity inventions of some of Fortinet’s closest competitors.



Innovation Insights - 300 Patents and Counting... | Fortinet Blog

Dell Cloud for U.S. government meets security standards | Dell

Dell Services Federal Government (DSFG) announced today it has received the Federal Risk and Authorization Management Program (FedRAMP) authorization for its cloud offering. This indicates that DSFG’s multi-tenant cloud platform, Dell Cloud for U.S. Government (DCG), has met the security standards and requirements in accordance with the Federal Information Security Management Act (FISMA).


Dell Cloud for U.S. government meets security standards | Dell

Periscope Sketching Feature on Live Streams

Periscope, Twitter’s live streaming video app, is now testing a new Periscope Sketching feature that allows users to draw and doodle on top of live-streamed video.



Periscope Sketching Feature on Live Streams

Advances in Advanced Threat Protection | Fortinet Blog

This week Fortinet announced even more advances to our award-winning, ICSA-certified Advanced Threat Protection solution – because, apparently, awesome simply wasn’t good enough.



Advances in Advanced Threat Protection | Fortinet Blog

Networks are Changing. Security Needs to Keep Up. | Fortinet Blog

Networks are currently undergoing dramatic change. Organizations are simultaneously wrestling with issues such as BYOD, IoT, virtualization, SDN, cloud, the proliferation of applications, Big Data, and the expectations of the next generation of employees to blend their work and their personal lives on a single device of their choosing, with instant access to any data, at any time, from any location.



Networks are Changing. Security Needs to Keep Up. | Fortinet Blog

Securing the Cloud | Fortinet Blog

In the emerging digital economy, organizations are connecting users, devices, data, goods, and services to drive business value. Organizations that want to compete successfully in this new economy are having to adopt new architectures, such as virtualization and cloud, to make them more agile, more responsive to customer needs and market demands, and more relevant to their customers.



Securing the Cloud | Fortinet Blog

10 Tools for Creating Music for Videos on the Cheap

Creating music for videos requires some level of talent and it might be expensive, too.
Luckily, the advent of the Internet brought along many affordable, and sometimes even free, online tools for creating music for videos and podcasts. All you need is a decent Internet connection, a computer and one of these tools below. However, you need to check on the legality of using beats and music created on each site.


10 Tools for Creating Music for Videos on the Cheap

Innovation Insights: Why Content Processing Matters | Fortinet Blog

Fortinet just announced the new tightly integrated Security Fabric, and the ninth generation of their content security processing ASIC, the CP9. The environment that spurs this sort of unprecedented innovation is focused on the following driving factors:
Anticipating the network, data, and user trends that demand more sophisticated threat protection, including cloud and virtualization, IoT, and the expanding attack surface.


Innovation Insights: Why Content Processing Matters | Fortinet Blog

Google Busting Publishers Using Clickjacking

Google has always been known to safeguard its applications to thwart anyone from using them for fraudulent activities. Recent developments in this regard have had Google defending its ad systems to prevent something known as clickjacking.



Google Busting Publishers Using Clickjacking

BMC Announces Resolution of Patent Infringement Disputes Against ServiceNow

HOUSTON – April 25, 2016 – BMC, the global leader in IT solutions for the digital enterprise, today announced that intellectual property (IP) and patent infringement disputes with Santa Clara, California-based ServiceNow, Inc. (NYSE: NOW) have been resolved to the mutual satisfaction of both parties. While specific terms of the settlement are confidential, ServiceNow announced on April 13, that it entered into a covenant not to sue for patent infringement with BMC for a term and took aggregate charges of $270 million for litigation settlement expenses related to its litigation associated with BMC and Hewlett Packard Enterprise.



RSS Content - BMC Software

The security review: Dorkbot, encryption and buildings

Welcome to this week’s security review, which includes a retrospective on Dorkbot, a reminder on why it’s important to invest in encryption, how buildings are at risk of cyberattacks and Australia’s major commitment to cybersecurity.



The security review: Dorkbot, encryption and buildings

Sound Suite lets You Market to Callers via On Hold Messaging

Sound Suite, a product from Tie National, a technology solutions provider for multi-location businesses, is a system designed to manage the content that callers hear while on hold.



Sound Suite lets You Market to Callers via On Hold Messaging

12 B2B Social Media Tips You Can Begin Using Today

Sites like Twitter and LinkedIn’s communication features aren’t only beneficial for small businesses with a specific client base. B2B companies can use them to their advantage as well. That’s why we asked 12 members of Young Entrepreneur Council (YEC) the following question:

“What B2B social media tips can companies use to communicate with potential customers?”

Here are some YEC community members’ B2B social media tips:


12 B2B Social Media Tips You Can Begin Using Today

University of Cambridge Partners with Mellanox to Deliver OpenStack-Based Cloud (NASDAQ:MLNX)

Mellanox RDMA-Capable Ethernet Interconnect Enables High Performance Cloud Networking, Drives HPC and Cloud Convergence



University of Cambridge Partners with Mellanox to Deliver OpenStack-Based Cloud (NASDAQ:MLNX)

Enter Selects Mellanox Open Composable Networks to Power Europe's First Multi-Regional OpenStack-Based Public Cloud (NASDAQ:MLNX)

Enhanced Cloud Efficiency and Flexibility with High-Performance, Open-Design Mellanox End-to-End Ethernet Cloud Network Fabric



Enter Selects Mellanox Open Composable Networks to Power Europe's First Multi-Regional OpenStack-Based Public Cloud (NASDAQ:MLNX)

"The Digital Transformation Playbook:" Fast, Furious Innovation

Business books nowadays focus on the shiny new startup, brilliantly creating digital products or services on one hand while handling social media like a breeze with the other.
This extreme focus on the media’s darling leaves out the established business. So what are companies that existed before the rise of social media to do?


"The Digital Transformation Playbook:" Fast, Furious Innovation

Over 100,000 South Korean Users Affected by BlackMoon Campaign | Fortinet Blog

The FortiGuard Virtualization Execution X (VEX) system – a behaviour-based, in-house framework designed to identify zero-day samples – has detected a previously undiscovered iteration of the BlackMoon Trojan.
BlackMoon Trojan is a banking trojan that is designed to phish user credentials from various South Korean banking institutions. It was discovered in early 2014 and was named after a debug string, “BlackMoon”, that was present in its code.


Over 100,000 South Korean Users Affected by BlackMoon Campaign | Fortinet Blog

Can AI fix education? We asked Bill Gates

The rise of smartphones has transformed the way students communicate and entertain themselves. But the classrooms they spend so much of their time in remain stubbornly resistant to transformation. On one hand, technology has long had a home in classrooms — I learned to type on an Apple IIe in the late 1980s.
But for most schools, the approach to teaching remains stubbornly one-size-fits-all: a single teacher delivering the same message to a group of about 30 students, regardless of their individual progress.

http://www.cnbc.com/2016/04/25/can-ai-fix-education-we-asked-bill-gates.html?__source=facebook%7Cother%7Cstatus%7C042516%7C5PM%7Cai-bill-gates

Saturday, April 23, 2016

SMS phishing attackers continue to pursue Apple users

A week ago I reported on my personal blog how criminals were spamming out SMS messages that claimed to come from Apple, but were actually designed to steal personal information for the purposes of identity theft.
The messages all used a cunning piece of social engineering – posing as a notice from Apple that their Apple ID was due to expire that very day – to get unsuspecting users to click on a link to a phishing website.


SMS phishing attackers continue to pursue Apple users

Your Gossip Is Public | Fortinet Blog

From time to time, AV analysts encounter "funny" Android malware or PUA: Riskware/Secretmimi!Android is one of those. 
This riskware is a social app used to share secrets (gossip). The "fun" part is that you certainly should not use it if you expect them to remain secret ;)


Your Gossip Is Public | Fortinet Blog

Digitale Kriegsführung: Von der Leyen baut neues Cyber-Kommando auf

Ministerin von der Leyen treibt die Aufrüstung der Bundeswehr im Cyberraum voran. Für das Konzept zur digitalen Kriegsführung soll nach SPIEGEL-Informationen ein Topmanager aus der freien Wirtschaft engagiert werden.

http://www.spiegel.de/politik/deutschland/ursula-von-der-leyen-praesentiert-konzept-fuer-cyberwar-a-1088746.html?utm_source=dlvr.it&utm_medium=facebook#ref=rss

Dutch police bust encrypted comms provider with 19k users — RT News

Dutch police have arrested the head of a local encrypted communication provider which operates the data of some 19,000 users on charges the firm was involved in “serious criminal activity.” Police say it distributed modified phones that later emerged in gang offenses.



Dutch police bust encrypted comms provider with 19k users — RT News

Friday, April 22, 2016

Google Continues Getting Local Businesses Online; eBay, Bigcommerce Partner to Sync Your Inventory

Whether you run a retail business in your local community or online, you can benefit from the use of certain online tools. For instance, Google is offering free workshops for local businesses to show they how to benefit from Google’s online business tools. And eBay and BigCommerce just announced a joint sales platform to increase reach for ecommerce businesses.
Read on for these headlines and more in this week’s Small Business Trends news and information roundup.


Google Continues Getting Local Businesses Online; eBay, Bigcommerce Partner to Sync Your Inventory

eBay and BigCommerce Open Joint Sales Platform with Bigger Reach for Your Inventory

BigCommerce, an Australian-based ecommerce startup that provides storefront software to help you get your products online and start selling, has announced it is entering into partnership with eBay to provide a scalable solution for efficiently managing of inventory and orders on both marketplaces.
As you probably already know, the modern retail sector is not what it once was — even a few years ago. It has changed. Today, consumers interacting with your business are not confined by devices, platforms or channel silos. Consumers buy in a manner dependent on context — purchasing when, where and on whatever device or platform that is most convenient at any given time.


eBay and BigCommerce Open Joint Sales Platform with Bigger Reach for Your Inventory

Two-factor authentication coming to PlayStation Network

Two-factor authentication (2FA) is to be added to the PlayStation Network, offering members even greater security.
News of this was first made public on Twitter on April 19th, when one of its users posted a tweet.


Two-factor authentication coming to PlayStation Network

Thursday, April 21, 2016

Australian government spends $230m on new cybercrime strategy

The Australian government has set aside $230 million in a new cybercrime strategy with a five-pronged plan of action.



The strategy proposes a range of new measures designed to tackle costly cybercrime incidents including ransomware, “hacktivism”, DDoS attacks and data theft through cyberespionage.



Australian government spends $230m on new cybercrime strategy

Free Google Workshops Offered To Local Small Business

Free Google workshops will be offered across the United States during the first week of May in an ambitious effort to help small businesses improve their online presence.
Why?  Because only 37 percent of small businesses claim or update their local listings on search engines — and Google wants to change that.


Free Google Workshops Offered To Local Small Business

5 Ways To Use Video To Showcase Handmade Products

When it comes to showcasing a product, there is nothing like the power of video. But if that is the case (and it is), then why is it that video seems to be the domain of people who are either selling services or the supplies used to make products?
If you make the products you sell, handmade products videos that showcase your work should be readily available all over the Web. After all, you have an endless stream of Made In America action that your customers want to see. So why deny them?


5 Ways To Use Video To Showcase Handmade Products

Half Of Small Businesses Will Have A Mobile App by 2017

It has taken a while, but small businesses are finally realizing the potential of mobile apps to gain more customers and increase sales.
According to a new survey by B2B research company Clutch, nearly 50 percent of small businesses will have mobile app by 2017. That’s impressive considering only 20 percent of small businesses have mobile apps today.


Half Of Small Businesses Will Have A Mobile App by 2017

Encrypt – or face a huge fine

The Information Commissioner’s Office (ICO), the UK’s independent authority that oversees data privacy, recently released a new guidance on encryption best practices. Although encryption of data is not mandatory under UK data protection legislation, the ICO strongly recommends that organizations dealing with personal data use it.
“In recent years there have been numerous incidents where personal data has been stolen, lost or subject to unauthorized access,” the ICO states.


Encrypt – or face a huge fine

Dell Teams With GE, Microsoft, OSlsoft, SAP, Software AG and Others | Dell

Dell today is launching the Dell IoT Solutions Partner Program for the advancement of Internet of Things (IoT) technologies and solutions. The program builds an ecosystem of partners to help customers navigate the fragmented IoT landscape and identify the right technologies to develop their IoT solutions. As a global leader in computing technology, Dell will offer participating partners access to the industry’s most robust and reliable product portfolio, world-class support and increased opportunities for incremental business growth. 



Dell Teams With GE, Microsoft, OSlsoft, SAP, Software AG and Others | Dell

Wednesday, April 20, 2016

How To Generate Website Leads - 5 Tips

Small businesses need to generate leads through their website. Unfortunately, they tend to be the sector least equipped to do so. There are some basic things you can do to generate website leads, however. Here are our top tips to do just that.



How To Generate Website Leads - 5 Tips

Mellanox Achieves Record Quarterly Revenue in the First Quarter 2016 (NASDAQ:MLNX)

Quarterly revenue growth of 34.2 percent, year-over-year to $196.8 million, sets new record
Quarterly Ethernet revenues grew 98 percent year-over-year, including EZchip
Closed acquisition of EZchip Semiconductor Ltd.


Mellanox Achieves Record Quarterly Revenue in the First Quarter 2016 (NASDAQ:MLNX)

Industry Q&A: What is Top of Mind for Communication Service Providers (CSPs) and MSSPs in Cybersecurity Today? | Fortinet Blog

For communication carriers today, it seems there are always fresh opportunities to deliver new and possibly lucrative network services for businesses and consumers. The growth of IoT alone holds tremendous potential for business opportunities. However, this is also a time of risk for carriers, as they they face increasingly sophisticated security threats. Fortinet's Richard Orgias offers some perspectives on the current state of the industry. 



Industry Q&A: What is Top of Mind for Communication Service Providers (CSPs) and MSSPs in Cybersecurity Today? | Fortinet Blog

AVT-PR-Avnet Cloud Marketplace Expands Offerings to Include IBM Connec

Avnet Business Partners in the U.S. and Canada will now have access to IBM’s innovative business social network platform to help their customers increase productivity



AVT-PR-Avnet Cloud Marketplace Expands Offerings to Include IBM Connec

Dorkbot: 5 years since detection

In the half-decade that has lapsed since Dorkbot was first identified, millions of innocent victims, going about their everyday business, have been affected in over 190 countries. It has, quite literally,wormed its malicious way into computer systems throughout the world, showing absolute disregard for anyone caught in its way. The information security industry has been all too aware of this.
Which is why, behind the scenes, professionals have been busy figuring out how to effectively tackle the threat, detected as Win32/Dorkbot. All that hard work finally had a big pay-off and towards the end of 2015, a notable breakthrough was achieved. ESET, along with Microsoft, CERT.PL and numerous law enforcement bodies (FBI, Interpol and Europol) around the world, dealt a bloody blow to this global menace.


Dorkbot: 5 years since detection

Buildings at risk of cyberattacks

In an increasingly connected world, the threat posed by cybercriminals will extend further than ever before – the Internet of Things (IoT) is shaking things up.
It’s no longer about computers or smartphones being at risk – any object, any ‘thing’ that is powered by a computer and/or connected to the internet, is a target.


Buildings at risk of cyberattacks

Dell Services Named a Leader in Internet of Things (IoT) | Dell

Dell Services today announced that it has been positioned as a Leader in overall IoT Services in the recently released NelsonHall Internet of Things “NEAT” evaluation. In the same report, Dell Services was also positioned as a leader in IoT Application Services, Secure IoT Infrastructure Management and New Business Model Development.



Dell Services Named a Leader in Internet of Things (IoT) | Dell

Tuesday, April 19, 2016

Cerner Honored For Advancing Pediatric Care

From #Cerner:


Cerner Honored For Advancing Pediatric Care

April 18, 2016
Children’s National Health System honored Cerner with the Children’s Innovation Award for the advancement and innovation of pediatric care through the Bear Institute for Health Innovation. Dr. Kurt Newman, president and CEO of Children’s National, presented the award to Cerner President Zane Burke at the 10th annual Children’s Ball on April 15.
“Cerner’s innovations support our ability to help children reach their full potential and provide access to quality health care,” said Dr. Newman. “Cerner’s work is driving quality, safety and financial benefits to our organization while improving outcomes for children and providing a better experience for families.”
In 2013, Cerner expanded its partnership with Children’s National to launch the Bear Institute, the nation’s first pediatric institute focused on advancing the health and well-being of children through innovative information technology (IT) and unique collaboration. The Bear Institute’s mission is to foster innovation, advance clinical care and create a world class IT structure to improve outcomes and service.
“Cerner is honored to be recognized with this award, and we are proud to see such transformational success from the industry’s first pediatric health IT institute,” said Burke. “Cerner and Children’s National continue to work toward a shared vision of helping children get the best possible start to long, healthy lives. We look forward to continued advancement and innovation as part of our commitment to improving patient care worldwide.”
Due to the institute’s success, Children’s National was recognized with the Transformational Leadership Award from the College of Healthcare Information Management Executives and American Hospital Association in October. Recent innovations and accomplishments include:
  • Developed MyBearGuide, a mobile patient and family engagement app that provides step-by-step wayfinding, displays emergency department wait times and outlines other hospital services and amenities 
  • Developed and implemented Quality Boards, highly visible dashboards that display real-time quality and safety indicators, which were recognized as a Magnet® best practice and featured in the Joint Commission Journal on Quality and Patient Safety 
  • Maintained high levels of mobile communication among nurses and providers through CareAware Connect™ as users sent a quarterly average of 325,000 secure text messages and 428,000 calls since July 
  • Engaged 75 percent of its workforce with multiple health and well-being initiatives, anchored by the Cerner WellnessSM engagement portal and coupled with additional services such as lab and biometric screenings and health coaching
In addition to its cutting-edge initiatives with Children’s National, Cerner has also been a passionate supporter of the health system’s philanthropic efforts. The Bear Institute and Cerner have supported the Children’s Ball, Junior Council’s Dancing After Dark, the Race for Every Child and other charitable initiatives.

Skype Bots Enhance Search Features, Responds To Queries

As part of announcements at Microsoft’s Build 2016 conference, Skype announced a new ‘Bot’ platform. Called Skype Bots, this feature is described by the company as “a new way to bring expertise, products, services and entertainment into your daily messaging on Skype.”
In the new platform, the services provided on Skype go beyond mere video chats and voice call features. The enhancement within Skype will allow you to look something up, such as check your calendar, manage your travel and hotel bookings, etc., with Microsoft’s very own digital assistant, Cortana. Additionally, this feature will also allow developers to build experiences for their services.


Skype Bots Enhance Search Features, Responds To Queries

Cybercriminals could access calls and texts using just your phone number

Your phone number holds the key that could give cybercriminals access to your location, phone calls and texts, according to a new report by CBS 60 Minutes.
The security flaw was demonstrated on – and with the permission of – US congressman Ted Lieu, who was given a new phone in California and was able to be tracked from Berlin by security researcher Karsten Nohl.


Cybercriminals could access calls and texts using just your phone number

10 Amazing Results from SMS Text Marketing

The world of digital marketing has evolved drastically over the course of the last decade. There are now more ways than ever to reach potential customers. But to be honest, some methods are drastically more effective than others.
Believe it or not, mobile marketing has actually risen to become one of the most efficient forms of advertising out there. By capitalizing upon the global populations increasing smartphone addiction, brands are already using mobile messaging to engage would-be super fans in loads of new and innovative ways.


10 Amazing Results from SMS Text Marketing

AVT-PR-Avnet Cloud Marketplace Expands Portfolio to Include VMware So

Avnet provides business partners in the U.S. and Canada with a new way to quickly deploy hybrid environments for their customers



AVT-PR-Avnet Cloud Marketplace Expands Portfolio to Include VMware So

AVT-PR-Avnet, Inc. Schedules Third Quarter Fiscal Year 2016 Earnings

AVT-PR-Avnet, Inc. Schedules Third Quarter Fiscal Year 2016 Earnings

Groove: Help Desk Software That Works Like Gmail

Groove is help desk software designed for small customer support teams that looks, feels, and works a lot like Gmail.
In fact, if you could take your Gmail account, enable it to be shared with others, allow private messaging that customers would not see, and track everything via a backend reporting system, you would have Groove.


Groove: Help Desk Software That Works Like Gmail