BizTech Magazine - Technology Solutions That Drive Business https://biztechmagazine.com/rss.xml en Why BYOD Makes Endpoint Security Crucial for Small Businesses https://biztechmagazine.com/article/2019/12/why-byod-makes-endpoint-security-crucial-small-businesses <span>Why BYOD Makes Endpoint Security Crucial for Small Businesses</span> <span><span lang="" about="/dashboard/kearadowdbclp" typeof="schema:Person" property="schema:name" datatype="">keara.dowd_bClp</span></span> <span>Fri, 12/06/2019 - 14:51</span> <div><p>The threat of cyberattacks is as prevalent as ever, with IT departments across industries working to bring their organizations’ protections up to speed. They’re expected to spend <a href="https://purplesec.us/resources/cyber-security-statistics/" target="_blank">more than $1 trillion on cybersecurity by 2025</a>, and small businesses are particularly vulnerable.  </p> <p>According to Fundera, the number of cyberattacks targeting small businesses last year <a href="https://www.fundera.com/resources/small-business-cyber-security-statistics" target="_blank">skyrocketed by 424 percent</a>, yet only <strong>14 percent of small businesses define their cybersecurity practices as “highly effective.”</strong> Considering that 60 percent of small businesses that fall victim to an attack shut their doors permanently within six months, this oversight can be devastating.</p> <p>Businesses often emphasize perimeter security, but with more and more employees using their personal devices for work tasks, endpoint security is more important than ever.</p> </div> <div> <div class="field-author"><a href="/author/talia-colwell" hreflang="en">Talia Colwell</a></div> </div> Fri, 06 Dec 2019 19:51:31 +0000 keara.dowd_bClp 45186 at https://biztechmagazine.com Winter 2019 https://biztechmagazine.com/magazine/issue/2019/12/winter-2019 <span>Winter 2019</span> <span><span lang="" about="/dashboard/kearadowdbclp" typeof="schema:Person" property="schema:name" datatype="">keara.dowd_bClp</span></span> <span>Thu, 12/05/2019 - 13:54</span> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/magazine/issue/2019/12/winter-2019" data-title="Winter 2019" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Dec</span> <span>05</span> <span>2019</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://biztechmagazine.com/magazine/issue/2019/12/winter-2019" data-title="Winter 2019" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fitok%3D0K8A9MGN%26destination%3D%2F%253Fitok%253D0K8A9MGN%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/magazine/issue/2019/12/winter-2019" data-title="Winter 2019" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> Thu, 05 Dec 2019 18:54:50 +0000 keara.dowd_bClp 45181 at https://biztechmagazine.com 5 Ways Digital Signs Improve the Customer Experience at Bank Branches https://biztechmagazine.com/article/2019/12/5-ways-digital-signs-improve-customer-experience-bank-branches <span>5 Ways Digital Signs Improve the Customer Experience at Bank Branches</span> <span><span lang="" about="/dashboard/kearadowdbclp" typeof="schema:Person" property="schema:name" datatype="">keara.dowd_bClp</span></span> <span>Thu, 12/05/2019 - 13:09</span> <div><p>When <a href="https://www.macu.com/" target="_blank">Mountain America Credit Union</a>, a full-service financial institution based in Utah, wanted to transform the member experience at its branches with an open-concept venue, the institution turned to <a href="https://www.cdw.com/content/cdw/en/brand/samsung-interstitial.html" target="_blank">Samsung</a> video walls and digital displays to guide people through the experience.</p> <p>“We wanted open areas where our employees can sit down and work with members on their financial needs,” <a href="https://insights.samsung.com/2018/04/20/samsung-digital-signage-displays-transform-branch-banking-experience/" target="_blank">said Jeremy Nelson</a>, Mountain America vice president of direct marketing. “And we needed something that made a strong visual impact on members from the moment they walked through our front doors.”</p> <p>The credit union is just one of many financial institutions <strong>embracing digital signage </strong>to better communicate their messaging and enhance the customer experience. Here are some of the top use cases for digital signage for financial institutions.</p> <h2>1. Video Walls Highlight Financial Services</h2> <p>The cornerstone of Mountain America Credit Union’s digital signage investment is an immersive, three-section video wall built with <strong>19 Samsung UD Series direct-lit LED displays</strong>. The three sections are synchronized to display images with accompanying audio, and they showcase custom content about the credit union’s products and services. The institution adopted the display not only to better serve its existing customers inside the branch, but also to potentially lure in passersby.</p> <p>“It’s all about the member experience,” Nelson said. “The first thing people see when they walk in is a huge video wall that entertains and educates them about our products and our philosophy. Even if you’re driving by, you can’t help but want to come in and see what’s inside.”</p> </div> <div> <div class="field-author"><a href="/author/calvin-hennick" hreflang="en">Calvin Hennick</a></div> </div> Thu, 05 Dec 2019 18:09:07 +0000 keara.dowd_bClp 45176 at https://biztechmagazine.com The 5 Cybersecurity Must-Haves for Every Business https://biztechmagazine.com/article/2019/12/5-cybersecurity-must-haves-every-business <span>The 5 Cybersecurity Must-Haves for Every Business</span> <span><span lang="" about="/dashboard/kearadowdbclp" typeof="schema:Person" property="schema:name" datatype="">keara.dowd_bClp</span></span> <span>Wed, 12/04/2019 - 16:49</span> <div><p>Walking the exhibition hall at a modern cybersecurity trade show can be a dizzying experience. Vendors from every angle tout products bearing seemingly urgent new capabilities (and new acronyms to match). The unspoken implication is that failure to purchase the latest solution will result in certain cybersecurity doom.</p> <p>It’s hard to separate the signal from the noise to determine which security solutions will really move the needle for a business.</p> <p>Here’s the thing, though: Robust cybersecurity programs <strong>revolve around a core set of solutions</strong> that provide the foundation for a strong cybersecurity operations team. Let’s take a look at a few of the technologies that should be in almost every business environment today.</p> <h2>1. Use Multifactor Authentication</h2> <p>Once considered a luxury, <a href="https://blog.cdw.com/security/4-ways-to-get-more-from-multifactor-authentication" target="_blank">multifactor authentication</a> is now foundational. The proliferation of sophisticated spear-phishing attacks in today’s threat environment means that we simply cannot rely on passwords alone to protect our systems from attack any longer. Organizations should have MFA deployed on <strong>almost all of their internal systems</strong> and should also consider using the technology for customer-facing applications, where practical.</p> <p>Today’s MFA solutions have come a long way in ease of integration and user friendliness. They come with prebuilt integrations for many commonly used applications and with smartphone apps that make completing the authentication process as simple as clicking a confirmation message on the user’s phone. Those that don’t already have two-factor in their environment should make it a top priority.</p> </div> <div> <div class="field-author"><a href="/author/mike-chapple" hreflang="en">Mike Chapple</a></div> </div> Wed, 04 Dec 2019 21:49:33 +0000 keara.dowd_bClp 45171 at https://biztechmagazine.com How Small Businesses Can Defend Against Cybercrime https://biztechmagazine.com/article/2019/12/how-small-businesses-can-defend-against-cybercrime <span>How Small Businesses Can Defend Against Cybercrime</span> <span><span lang="" about="/dashboard/kearadowdbclp" typeof="schema:Person" property="schema:name" datatype="">keara.dowd_bClp</span></span> <span>Wed, 12/04/2019 - 16:04</span> <div><p>Maybe it’s time to stop fearing hackers and start listening to them. That’s what Keren Elazari, a cybersecurity analyst and senior researcher at <a href="https://english.tau.ac.il/" target="_blank">Tel Aviv University,</a> thinks. Elazari travels the world speaking to organizations about cybercriminals’ latest tactics and tools. In a conversation with <em>BizTech</em> Managing Editor Bob Keaveney, Elazari says businesses must look closely at what threat actors are doing to formulate a proper response.</p> <h2><span style="color: #c74037;">BIZTECH: </span>You’ve called yourself a “friendly hacker.” Most people don’t think hackers are friendly at all. Can you clarify?</h2> <p>I draw a distinction between the term “hacker” and the term “cybercriminal.” <strong>They should not be used interchangeably</strong>. Not all hackers are bad. Some are friendly hackers. Security researchers like myself, and penetration testers, for example — some people are quite happy to call themselves hackers and are not criminals.</p> <p><script type="text/javascript" src="//sc.liveclicker.net/service/getEmbed?client_id=1526&amp;widget_id=1233420850&amp;width=640&amp;height=360"></script></p> </div> <div> <div class="field-author"><a href="/author/bob-keaveney" hreflang="en">Bob Keaveney</a></div> </div> Wed, 04 Dec 2019 21:04:42 +0000 keara.dowd_bClp 45166 at https://biztechmagazine.com Comprehensive Security Solutions Deliver Enhanced Protections https://biztechmagazine.com/article/2019/12/comprehensive-security-solutions-deliver-enhanced-protections <span>Comprehensive Security Solutions Deliver Enhanced Protections</span> <span><span lang="" about="/dashboard/kearadowdbclp" typeof="schema:Person" property="schema:name" datatype="">keara.dowd_bClp</span></span> <span>Wed, 12/04/2019 - 14:29</span> <div><p>By the close of 2018, telecom provider <a href="https://www.omnitel.biz/" target="_blank">OmniTel Communications</a>’ plan to replace field technicians’ laptops with mobile devices was almost ready to go.</p> <p>Trucks would soon be outfitted with <a href="https://biztechmagazine.com/networking/wi-fi" target="_blank">Wi-Fi </a>to provide constant connectivity; technicians’ laptops were slated to be replaced with <a href="https://www.cdw.com/search/Software/Operating-Systems/Windows-Client-Software/?w=F34" target="_blank">Windows</a>-compatible tablets and iPhones.</p> <p>But the Nora Springs, Iowa-based company’s IT team wasn’t sure if the security solution it had been using — which offered endpoint protection but not server c­overage — would be <strong>comprehensive enough to meet its evolving data protection needs</strong>.So, the company turned to <a href="https://www.cdw.com/content/cdw/en/brand/sophos.html" target="_blank">Sophos</a> for endpoint and server protection, threat intelligence and <a href="https://www.cdw.com/content/cdw/en/solutions/digital-workspace/mobile-device-management.html" target="_blank">mobile device management</a> (MDM). According to Michael Kaiser, IT technology strategist at OmniTel, comprehensive capabilities are vital for protecting customer data, which is essential for a public-facing company whose customers count on it to keep them safe.</p> </div> <div> <div class="field-author"><a href="/author/erin-brereton" hreflang="en">Erin Brereton</a></div> </div> Wed, 04 Dec 2019 19:29:54 +0000 keara.dowd_bClp 45161 at https://biztechmagazine.com How Small Businesses Use HCI to Get More from Each IT Staffer https://biztechmagazine.com/article/2019/12/how-small-businesses-use-hci-get-more-each-it-staffer <span>How Small Businesses Use HCI to Get More from Each IT Staffer</span> <span><span lang="" about="/dashboard/kearadowdbclp" typeof="schema:Person" property="schema:name" datatype="">keara.dowd_bClp</span></span> <span>Wed, 12/04/2019 - 09:08</span> <div><p>As a provider of transportation management software, <a href="https://mercurygate.com/" target="_blank">MercuryGate</a>’s developers are the soul of its business. The Cary, N.C.-based company needs to provide those developers, many of whom work remotely, with world-class technology.</p> <p>But as a small company with an even smaller IT staff, MercuryGate must do so with solutions that are simple to manage and support.</p> <p>That’s why the company runs its <strong>virtual desktops on hyperconverged infrastructure</strong> from <a href="https://www.cdw.com/content/cdw/en/brand/nutanix.html" target="_blank">Nutanix</a>. The virtual desktop infrastructure dramatically reduces the complexity of deploying compute resources to developers, and its combination of storage, compute, and networking makes it easier for the company’s IT staff to monitor ­performance, troubleshoot problems, update the infrastructure, and expand the environment over time.</p> <p>“The hyperconverged infrastructure is great for us because it’s a single point of management,” says Chris Cary, IT director for MercuryGate. “You have all the resources you need in one box, and you have the ability to manage it from a single place.”</p> <p>This ability to be flexible with staffing has turned out to be one of the key advantages that hyperconverged organizations enjoy, says Andrew Smith, research director within the enterprise infrastructure practice at <a href="https://www.idc.com/" target="_blank">IDC</a>. That’s hugely valuable for small businesses that need their <strong>IT professionals to wear multiple hats.</strong></p> <p>“I think the most interesting thing we have seen is not the shifting of IT staff to higher-value, business-oriented tasks but the shift from IT specialists to IT generalists,” Smith says. “Instead of having different network, virtual machine and storage administrators, you have a single infrastructure generalist in charge of managing all three.”</p> <p>That’s exactly how hyperconvergence has played out for MercuryGate. “I had my virtualization engineer,” Cary says. “She is now a storage engineer, a network engineer and a virtualization specialist. She’s able to do it all, where before, I would have had multiple people doing this.”</p> <p>“It’s hyperconverged infrastructure,” Cary adds, “but it also kind of <strong>creates a hyperconverged technician</strong>.”</p> </div> <div> <div class="field-author"><a href="/author/calvin-hennick" hreflang="en">Calvin Hennick</a></div> </div> Wed, 04 Dec 2019 14:08:05 +0000 keara.dowd_bClp 45156 at https://biztechmagazine.com IoT Success Demands the Right Network Infrastructure https://biztechmagazine.com/article/2019/12/iot-success-demands-right-network-infrastructure <span>IoT Success Demands the Right Network Infrastructure</span> <span><span lang="" about="/dashboard/kearadowdbclp" typeof="schema:Person" property="schema:name" datatype="">keara.dowd_bClp</span></span> <span>Tue, 12/03/2019 - 15:22</span> <div><p>Although <a href="https://www.usg.com/content/usgcom/en.html" target="_blank">USG</a> is not a household name, its signature product is inside nearly every American home. The maker of building products invented drywall more than a century ago.</p> <p>Staying true to its history of innovation, USG has positioned itself at the forefront of advanced manufacturing in recent years by investing in <a href="https://biztechmagazine.com/networking/internet-things">Internet of Things</a> technology, including robots, throughout its manufacturing plants.</p> <p>Networked sensors embedded in manufacturing equipment provide <strong>real-time insights on plant operations</strong>, allowing the company to better manage quality control, increase profits and improve safety and efficiency. But to take advantage of IoT, the company first needed to upgrade each plant’s network infrastructure, says Anson Johnson III, USG’s senior director of IT operations.</p> <p>“We wanted to propel our plants into the future with advanced networking so they could handle the load of all those IoT devices and make our plants more efficient and more automated,” Johnson says. “The ultimate goal is to lower costs, be faster to market and continue the quality that USG is known for.”</p> <p>Companies in industries such as <strong>manufacturing, energy, transportation and retail</strong> deploy IoT to collect and analyze real-time data on the performance and state of their equipment so they can improve operational efficiency, perform preventive maintenance and make smarter business decisions.</p> <p>But to succeed, companies have to build the right IT infrastructure to support IoT, and that includes data center equipment with a scalable network, says <a href="https://go.forrester.com/" target="_blank">Forrester</a> Research Analyst Michele Pelino.</p> </div> <div> <div class="field-author"><a href="/author/wylie-wong" hreflang="en">Wylie Wong</a></div> </div> Tue, 03 Dec 2019 20:22:47 +0000 keara.dowd_bClp 45151 at https://biztechmagazine.com Giving Tuesday: How Mobile Giving Has Changed Philanthropy https://biztechmagazine.com/article/2019/12/giving-tuesday-how-mobile-giving-has-changed-philanthropy <span>Giving Tuesday: How Mobile Giving Has Changed Philanthropy</span> <span><span lang="" about="/dashboard/kearadowdbclp" typeof="schema:Person" property="schema:name" datatype="">keara.dowd_bClp</span></span> <span>Tue, 12/03/2019 - 09:10</span> <div><p>Black Friday, Small Business Saturday and Cyber Monday are all behind us, but the long Thanksgiving weekend isn’t over yet. Many will be digging deep into their pockets again today, but not for themselves—this time, it’s for Giving Tuesday. </p> <p>Today marks the unofficial start of the holiday donation season, and the day’s significance continues to grow. <a href="https://nonprofitssource.com/online-giving-statistics/giving-tuesday/" target="_blank">Nonprofits raised $380 million online</a> on Giving Tuesday last year, <strong>up 38 percent from 2017</strong>, according to Nonprofit Source.  </p> <p>Advancements in technology have made donating easier than ever, and as donors look for convenient ways to give, <a href="https://www.cdw.com/content/cdw/en/industries/nonprofit/nonprofit-it-services-and-solutions.html" target="_blank">infrastructure for mobile fundraising</a> is a must for every organization. Through text-to-donate, mobile-centered web pages and apps, nonprofits can get the most out of this charitable time of the year. </p> <p><a href="https://webobjects.cdw.com/webobjects/media/pdf/Solutions/nonprofit/Fundraising-WP-MKT11409.pdf?cm_mmc=Vanity-_-NonprofitFundraisingWP-_-MKT16360-_-092016" target="_blank"><strong><em>READ MORE: </em></strong><em>Learn about how technology has changed how nonprofits fundraise.</em></a></p> <h2>Text-To-Donate Makes Contributing Easy</h2> <p>Text-to-donate is one of the quickest, simplest, most versatile ways people can give to an organization. Donors can text a number with the amount they’d like to donate, and they’ll receive a link that takes them directly to a donation form already filled out with that amount. Many platforms, such as <a href="https://snowballfundraising.com/#text_to_give" target="_blank">Snowball</a>, keep the donation process to <strong>two easy steps while keeping fees low</strong>, allowing the money to go right to the causes.</p> <p>These kinds of services can also be used during live events to boost donations. Platforms such as <a href="https://www.onecause.com/solutions/text-to-give/?utm_source=donorsearch&amp;utm_medium=referral" target="_blank">OneCause</a> are built specifically to streamline fundraising during galas and concerts. Others, like <a href="https://gesture.com/" target="_blank">Gesture</a>, are designed for text bidding during auctions. </p> <p>Text-to-donate platforms can also help <strong>engage an organization’s donor base</strong>. Some allow nonprofits to text back-and-forth with their donors, getting feedback and encouraging them to get involved in ways other than just monetary donations. Organizations can answer donor questions or even let them participate in a contest.</p> <h2>Donation Pages Must Be Mobile-Responsive</h2> <p>At a time when most people walk around with a phone in their pocket, it’s no longer enough for nonprofits to have a healthy and easy-to-navigate website, they now must have pages that are <strong>effective for mobile web browsing</strong>. This includes branding with proper dimensions and simple donation pages that are built for the mobile screen.</p> <p>It’s also important that mobile donations be seamless, so nonprofits should make sure that donors can give via services like <a href="https://www.cdw.com/content/cdw/en/brand/apple.html" target="_blank">Apple</a> Pay and <a href="https://www.cdw.com/content/cdw/en/brand/google-interstitial.html" target="_blank">Google</a> Pay, so they never need to leave the phone screen to make contributions.</p> </div> <div> <div class="field-author"><a href="/author/keara-dowd" hreflang="en">Keara Dowd</a></div> </div> Tue, 03 Dec 2019 14:10:11 +0000 keara.dowd_bClp 45146 at https://biztechmagazine.com Here’s How to Keep A Website Humming, No Matter How Much Traffic It Gets https://biztechmagazine.com/article/2019/12/heres-how-keep-website-humming-no-matter-how-much-traffic-it-gets <span>Here’s How to Keep A Website Humming, No Matter How Much Traffic It Gets</span> <span><span lang="" about="/dashboard/bobkeaveneyu64t" typeof="schema:Person" property="schema:name" datatype="">Bob.Keaveney_u64t</span></span> <span>Mon, 12/02/2019 - 13:48</span> <div><p>Retailers spend <strong>a lot of time and money building up excitement for today’s big Cyber Monday</strong> holiday shopping events. Their websites and online, TV and newspaper ads shout about “doorbusters”; #cybermonday and related hashtags are baked into their Twitter posts; emails go out to past customers offering them additional discounts for stopping by again; and their Facebook pages tantalize with the promise of gift cards or coupon codes.</p> <p>Last year, U.S. online sales on Cyber Monday were <a href="https://www.cnet.com/news/cyber-monday-breaks-records-with-7-9-billion-in-online-sales/" target="_blank">$7.9 billion</a>, with a growing share coming from mobile transactions. This year <strong>Cyber Monday is expected to set a new record</strong> as the largest — and fastest-growing — online shopping day of the year with <a href="https://theblog.adobe.com/adobe-forecasts-143-billion-in-u-s-online-sales-this-holiday-season/" target="_blank">$9.4 billion</a> in projected sales. More than <a href="https://www.cnbc.com/2019/10/22/cyber-monday-to-excite-holiday-shoppers-more-than-black-friday.html" target="_blank">50 percent</a> of people will rely on Cyber Monday for discount purchases vs. 44 percent who rely on Black Friday.</p> <p>That’s a lot of shopping, and a lot of people logging in to get the deals.</p> </div> <div> <div class="field-author"><a href="/author/jennifer-zaino" hreflang="en">Jennifer Zaino</a></div> </div> Mon, 02 Dec 2019 18:48:25 +0000 Bob.Keaveney_u64t 45141 at https://biztechmagazine.com