publish date: May 8, 2018
When building programs to develop employees, many companies begin by looking at potential weaknesses and implement training to patch up those shortfalls. What companies don’t realize is that a potentially more efficient tactic for strengthening their team is to focus on the strengths of their team. At Intellicom, we’ve experienced a multitude of benefits since adopting a strengths-based development program and investing in such.
publish date: February 12, 2018
In the growing digital world, every advantage to improving user experience is necessary to compete for your online audience. Accessibility is one such tactic you need to consider when developing your website and planning ways to expand your reach. Not only is this a good idea for digital strategy, it could also be legal issue if you don’t make sure your site is accessible.
publish date: January 25, 2018
As has been reported extensively in the media, on January 3, 2018, the National Cybersecurity and Communications Integration Center (NCCIC) became aware of a set of security vulnerabilities – known as Meltdown and Spectre – that affect modern computer processors. Exploitation of these vulnerabilities could allow an attacker to obtain access to sensitive information.
publish date: November 16, 2017
I was visiting with an attorney friend the other day and he remarked that he likes to remind his clients to always be asking themselves the “what if” question. What if something happened to their business? What if there was natural disaster; or a man-made disaster; or really any drastic change affecting their company’s ability to conduct business as usual? I thought this was very good advice and worth sharing. When you are looking to the future of your business, giving thoughtful consideration to various risks and planning in advance how to respond to them could mean the difference between success and failure.
publish date: October 27, 2017
As you may have seen in the news, a widespread vulnerability in Wi-Fi networks was revealed last Monday. This vulnerability allows hackers to decrypt and potentially see what people are doing online. The reason this security vulnerability is so worrying, and why it has drawn so much interest, is that most people want to assume that their local Wi-Fi network is a trusted environment.
publish date: August 9, 2017
Encrypting email is ensuring that the information you send is only available to you and the person you are sending it to. Unprotected data is particularly vulnerable when it is in transit between email servers. Those with malicious intent often see the time when data is being transferred as a prime opportunity to attempt a hack. When you encrypt your email, you are protecting things like passwords and personal information from third-party access.
publish date: June 14, 2017
You’ve probably recently heard about the cyber-attack that was executed on an unprecedented scale. The attack was executed globally with more than 150 countries affected; companies of all sizes and various government agencies were targeted. Known as “WannaCry”, this ransomware gains access into the computer, encrypts data, and locks the user out until a ransom has been paid.
publish date: April 19, 2017
There are several signs to indicate that a website needs to be updated. Outdated design and functionality are a classic sign because it’s easy to notice the pain and hassle of trying to navigate a site that wasn’t designed for modern browsing. The thing is, our detection system sometimes turns a blind eye when it comes to our own sites. Apply these three areas of inspection to your own site and see where yours stands.
publish date: March 13, 2017
Office 365 is the latest in the modern push for services that allow businesses and individuals alike to take advantage of having enterprise level software at a fixed monthly fee. If you are new to Office 365 or are thinking about whether it is right for you, there are a few defining aspects of the new software that you should know.