Internet Security

A New Variant of Crypto-Ransomware Hits the Globe

Posted date: May 15, 2017

Have you heard the news? On Friday, May 12th, a new variant of Crypto-Ransomware (WannaCry) was released worldwide causing major disruptions at hospitals, private and public institutions, and has since garnered major media attention. This attack was ...

Read More »

Microsoft and Facebook Take Measures Combat Cyber Threats

Posted date: April 12, 2017

Why are major companies investing so heavily in Cybersecurity?  Mike and Amy discuss the new plans Microsoft and Facebook have made in this segment of the BLIT. Learn more about what your business should be doing regarding two-factor authentication ...

Read More »

Is your Business Safe from Virtual Threats?

Posted date: October 27, 2015

Did you know that 50% of small business owners think their businesses are too small to be targeted by the thieves of the virtual world? Contrary to popular belief, 72% of hacker attacks often happen to smaller firms – firms with less than 100 e ...

Read More »

Chat Encryption Services, Apple Sales, and Music Streaming Wars

Posted date: October 6, 2015

Tech Run Down: Apple raised some hype by stating that they were going to be on pace to have a record opening weekend for iPhone 6s sales. However, analyst Gene Munster stated that Apple’s positivity is more about production than demand. Apple r ...

Read More »

5 Ways You Can Improve Your Search Engine Rankings

Posted date: September 29, 2015

In an age where most business happens online, not showing up in Google search results can really hurt you. While there’s no real shortcut to showing up consistently on web searches, there are a few quick fixes to get your site to show up on your po ...

Read More »

“Password1” Is Most Common – Trustwave Security Report

Posted date: June 11, 2015

Trustwave  just released their 2015 Global Security Report, a comprehensive look at worldwide Internet security. A few key findings from their security testing: – 98% of applications tested were vulnerable – 20: Median number of vulnera ...

Read More »

Do You Use Proper LinkedIn Etiquette?

Posted date: May 19, 2015

LinkedIn Etiquette – Are you Violating the Etiquette Rules?  While both Facebook and LinkedIn are social networks, LinkedIn etiquette differs from Facebook etiquette in several specific ways.  As its role in professional circles grows, users ...

Read More »

30% of Babies Learn How to Use Smartphones

Posted date: May 7, 2015

    Mike Maddox and Erik Jacobsen discuss a recent study, which found that one in seven babies under the age of one use smartphones for at least one hour per day, and that almost one quarter of them have made a phone call.  They can’ ...

Read More »

Lenovo Buys Motorola and Cyber Security Facts

Posted date: November 11, 2014

Mike and Matt hit the studio to bring you Bottom Line IT this week with the latest technology news on the Michigan Business Network. Show topics this week: Lenovo Buys Motorola, U.S Internet Monopolies, Google’s New Self Programming Computer, P ...

Read More »

Why Big Data Matters to Small Business

Posted date: October 7, 2014

Mike and Matt strike again and while the iron is hot to bring you the latest IT news this week on the Michigan Business Network. Show topics this week: Credit Card Processing, Why Big Data Matters to Small Business, Why Should Small Business Care Ab ...

Read More »