Beware of these social engineering tactics

As the spectacle and competitive atmosphere of the Rio Olympic Games have drawn the world’s attention, hackers who use social engineering are inching closer to our private information. Although our systems may be prepared for the likes of malware and worms, social engineering is a different beast of its own.

Build better chatbots with these 5 tips

Before the US reached its current golden age, it went through a period known as the Wild West stage. This had less to do with cowboys and shootouts and more to do with limitless possibilities that can almost overwhelm you. That’s exactly where chatbots are today, With a myriad of ways to customize your chatbot, it’s so easy to get lost in all your options! To sustain your focus, we offer 5 tips to help you make your next chatbot a better one:
Emulate the WeChat Model
This Chinese cross-platform instant messaging app has housed chatbots since 2011 and shows no signs of letting up.

Network virtualization: why you should care

As difficult as virtualization may be to understand, it continues to march toward widespread adoption. Up until now, the service was mostly limited to making hardware and software resources better allocated based on needs. However, corporate bigwigs AT&T and Verizon are jumping into the game by adding the option to virtualize network services.

Best practices for SMB Facebook pages

Considering the most recent stats of Facebook’s daily usage -- an astounding 1 billion daily mobile users, to be exact -- it’s time to take another look at your company’s page. Even if you’re actively managing your page, changes and updates are so frequent at the social media colossus that there’s likely a feature or opportunity you’ve missed.

Office 365’s e-appointment app: Bookings

We all undeniably have hectic schedules, and they’re made even worse with unorganized meetings, impromptu playdates, and unscheduled yoga classes you were forced to attend. In order to move or cancel appointments, you’d generally have to pick up the phone and call someone, which can be a drag.

Two new tools for defeating ransomware

A simple Google search of “ransomware” returns just over 9 million results. So, too, does a search for “Three Mile Island,” the location of the late-70’s Pennsylvania nuclear meltdown. And while we don’t mean to equate the near catastrophe of the latter to having your company’s data hijacked by computer hackers, ransomware can in many cases end in disaster for your business.

Secret upgraded functions for Firefox

In today’s modern day and age, the term “upgrade” has become associated with everything from hotel rooms to web browsers. It usually implies “better,” and who wouldn’t want that? After returning from a brief break, the web browser debuted its arsenal of upgraded functions -- 8 to be exact -- that helps make every browsing session more effortless and efficient.

5 ways to get the most out of the latest fads

Have you seen folks wandering around downtown, staring at their phone like it was a map pointing them to a pot of gold? Or ordering pizza over a Facebook chat conversation with an awkward cashier? With some creative marketing and structuring, your SMB could be on the other side of those people’s phones.