Some of you know from my past blog posts and emails that the Russian Federation is one of the most prolific sources of hacking against websites and social media platforms. Not just in Europe, but here in the U.S. as…
As with any company relocation, it’s a great chance to rethink office layouts and workflow, get rid of old hoarded files and copies of golf publications dating back to, well, seemingly the turn of the century. And, as the digital…
In analyzing email database list management, we believe the winners are those marketers who don't focus on quantity (the biggest), but rather the ones who are targeting quality (the most engaged). In this case, smaller can beat out larger. And,…
On March 10, 2020, Tom Burt, a cybersecurity executive at Microsoft, released a blog post about a significant step taken to corral one of the most prolific botnets we’ve ever seen. In coordination with worldwide ISPs, domain registrars and with…
Last week the Department of Homeland Security and Mozilla, an open source browser developer, warned users to update the popular Firefox browser. It seems that hackers have continued to cast their nets far and wide looking for holes in Internet…
Many technology executives will tell you: there's no such thing as privacy on the Internet. In many ways they are right. Whenever you sign up for any social media website, the information you share is collected in massive data warehouses…
Have you had a Starwood Hotel guest reservation since 2014? If so, Starwood's full line of hotel brands, all owned by Marriott Corporation, has had its entire database breached by hackers that will impact up to 500 million customer accounts.
In the inbound marketing stack, there are a number of inter-connected tools used to attract, inform and convert existing customers and newly-found prospects. Social media, pay-per-click and programmatic digital advertising have emerged as leaders in both B2B and B2C marketing…
Within the last few days you may have heard that Twitter is self-reporting a potentially catastrophic event that could have been a major blow to online security. From all appearances and claims by Twitter, they escaped any hacker intrusions and…
In November 2017, I wrote an extensive post about the KRACKS cybersecurity threat against home and business Wi-Fi routers. It appears this particular threat has run its course, although vulnerable routers still exist all around the world. If your IT…
I was part of the decision-making that led to the transformation of the original Netscape Browser into what is today known as Firefox. That took place in 2001 when we spun the entire browser team out of Netscape and provided…
If you ever walked into your business office and your iPhone, iPad, Android Phone or your notebook computer automatically re-connected with your company's Wi-Fi Router, you may be vulnerable. If you walk into a Starbucks, or your home office or…