News

Social Media Poses Security Risks

Date: 01 Jun 2009 | Posted BY: ulisticadmin

Security company Websense released a survey of of 1,300 IT professionals worldwide revealing that although social media or the use of “Web 2.0″ technologies such as blogs, wikis and social networks are already pervasive in business, a majority of IT managers seem ill equipped to manage its use, much less protect against security concerns associated with it. According to the survey, 70 of the t

Facebook Users Targeted By Phishing Attack

Date: 25 May 2009 | Posted BY: ulisticadmin

Last May 14th, reports indicated that hackers had launched a phising attack on Facebook’s 200 million users, successfully stealing passwords from some. The hackers set up websites designed to look like the Facebook home page. Victims were directed to log back in to the site, but were routed to the fake site instead, unwittingly giving away their passwords. Facebook has deleted all references to

Stop Wasting Money with Inefficient Communications

Date: 04 May 2009 | Posted BY: ulisticadmin

Research conducted by SIS International Research and sponsored by Siemens found that small and midsized businesses (SMBs) with 100 employees could be leaking a staggering $524,569 annually as a result of communications barriers and latency. The study identifies these top five pain points, in order of estimated cost: inefficient coordination waiting for information unwanted communications;

Look for New Microsoft Office and Windows Vista Service Pack

Date: 04 May 2009 | Posted BY: ulisticadmin

Microsoft recently announced the release of the newest service pack to Microsoft Office 2007, and has finished work on the second service pack update to Windows Vista. The MS Office update includes a collection of stability and performance updates as well as support for more file formats including Open Document Format (ODF) and Portable Document Format (PDF) files. The Windows Vista update include

Security Resources, Articles, and Tips from the Government

Date: 27 Apr 2009 | Posted BY: ulisticadmin

Looking for a website or online resource for Security Tips and Best Practices? Check out the Federal Trade Commission’s (FTC) OnGuardOnline program, which the FTC began in partnership with cybersecurity experts, online marketers, consumer advocates, and federal officials in 2005. While there, check out the articles and free resources such as videos, games, and downloadable files to help you guar

Using Social Media for your Business

Date: 27 Apr 2009 | Posted BY: ulisticadmin

Social Media such as Blogs, Micro-blogs, Wikis, and Social Networks are not only helping many people communicate and connect, but are also powerful tools for business as well. They can be used to promote your products and services, engage customers in meaningful conversations, network and develop new relationships, or simply to distribute information about your business online. Recently, the media

What’s Next for Conflicker?

Date: 03 Apr 2009 | Posted BY: ulisticadmin

April fool’s day came and went, but so far the much feared attack from Conflicker never materialized, leaving security researchers to ponder what’s next for the notorious Internet worm. Although it didn’t release any detectable malicious payload, the arrival of April 1 did trigger a change in its behavior, with experts finding a finding a changed domain generation algorithm that opens up unf

Use Technology to Market your Business

Date: 03 Apr 2009 | Posted BY: ulisticadmin

Never before have startup entrepreneurs and small business owners had access to so much marketing advice and tools as we have today on the Web.  There are hundreds of free or near free tools out there that you can use: from sites that help you create your own logos, print your own business cards, set up your own website, even make your own marketing swag. There are literally hundreds of even more

Protecting Against the Rampant Conficker Worm

Date: 02 Apr 2009 | Posted BY: ulisticadmin

PC World posts a nice overview of the highly infectious Conflicker Worm. The Worm is dangerous as it uses several methods of attack. Once one computer in a network is infected, it often has ready access to other vulnerable computers in that network and can spread rapidly. The worm can download and install additional malware from attacker-controlled Web sites as well. Since that could mean anything

18 Tips For Small Businesses That Outsource

Date: 02 Apr 2009 | Posted BY: ulisticadmin

Janet Attard of The Business Know-How Blog posts 18 tips for small businesses considering outsourcing. She offers insight on how to get the best possible results from outsourced work. Among them: Know the results you want to achieve. Understand how long it should take to complete the work. (Ask others in your industry if you’re not sure.) Set a realistic time table for achieving results.