While marketing via company blog on WordPress remains an extremely popular way for businesses to get attention, many have not ensured that their blogs are turbocharged with all the latest plug-ins. These tools, which are generally free, can ensure that a blog appears as high as possible in search-engine returns, downloads blazingly quickly for readers, and is well-protected from spammers and others looking to compromise your efforts.
While e-mail spammers are about as popular as a carnival barker at a wedding, too many of us are being unfairly characterized as spammers simply because our e-mails “look like” spam.
Security experts say that yesteryear’s hacker has given way to organized-crime teams who are determined to steal and monetize stolen data.
With the job market the best it’s been for job seekers in 15 years, digital-recruiting toolmakers are serving up even better solutions to ensure that companies can capture the best of the talent. The new tools come at an opportune time, given that the economy appears poised for continued healthy growth.
Auto-parts businesses will be on the hook for credit card fraud if they don’t migrate to new chip card terminals by October 1, 2015, according to the major credit card companies.
As of June 2015, telecommunications and cable companies were knocked back on their heels when new government regulations took effect prohibiting those companies from allowing some company websites to download faster than others. The move restores what has commonly become known as net neutrality—or equal access to the Internet.
Microsoft’s Mea Culpa to PC Users
Businesses that reacted to Windows 8 with howls of incredulity can take heart: Microsoft is bending over backward with its next Windows release to win back the mouse-and-keyboard crowd. With Windows 10 (there will be no Windows 9), due for release in the summer of 2015, Microsoft will make it simple once again to navigate the operating system with a keyboard and a mouse. Moreover, the Redmond Goliath will be bringing back other features, such as the Start Menu that made Windows a hit in previous incarnations. “It’s a practical approach, which is ‘customer first,’” said Satya Nadella, CEO of Microsoft.
IT security experts warn that there’s been a spike in the scourge of ransomware—malicious software that freezes a computer, encrypts all of its data and demands a ransom for the system’s restoration. Since February 2013, more than 600,000 victims worldwide have reportedly been infected with just one variant of the malware, CryptoWall, according to an October 2014 report released by Dell.
“This is the next generation of ransomware, and you can expect this new version to spread like wildfire,” said Stu Sjouwerman, CEO of KnowBe4, a firm that specializes in IT security awareness training for small- and medium-size businesses.
For Bad Actors, Pretty Much
While search-engine optimization (SEO)—the art of optimizing a web property for the highest possible search-engine returns—is not dead, the antics of those looking to game the system pretty much are. The reason: During the past few years, Google has gone out of its way to aggressively thwart practitioners of “black hat” SEO techniques, to the point where their tricks and ruses have been mostly neutralized.
Specifically, Google’s updates to its search-engine algorithm, with code names such as...
Key Contract Provisions
While untold numbers of businesses are saving money by moving to the cloud, IT experts say that these companies need to ensure that their cloud contracts include ironclad security protections or they’ll suffer an uncertain future.
“Look at the news on any given day,” said Ron Zalkind, chief technology officer at CloudLock, a service provider that helps companies secure public cloud accounts, such as Google Apps and Sales Force. “You’ll clearly see that the number of risks and data breaches is accelerating.” Moreover, getting from “uncertainty” to “protected” can be more difficult than you might expect, given that many providers of cloud services are reluctant to put their security assurances in writing.