Blog Search
Past Entries
Blog Links

Business Lessons Learned from the Sony Hack Attack

By George Rosenthal

The hack attack on Sony has been a business disaster for the movie company.

In addition to leaked emails, revelation of salary data, and unfortunate disclosure of various private opinions regarding movie stars and upcoming films, the company’s stock price fell by double digits. 

Read the rest of entry »

How to Stop Online Ads That Follow You Around the Internet & Save Christmas

You just bought your wife a nice Christmas present online. You’ve followed through with your purchase and can kick back to enjoy a nice, steaming mug of hot chocolate while basking in your accomplishment. She asks to use the computer. No big deal, right?

While online security is a big concern consumers have during the holiday season, as more than 44% of holiday gifts are purchased online, your biggest security concern may be ads that follow you around the internet and keeping them from the person you love the most.

During the holiday season, online marketers are beefing up their personalized retargeting efforts, utilizing the Google Display Network to target past visitors who have viewed product pages or have added those products to their online carts.

Personalized retargeting ads can appear just about anywhere, as retailers and their marketing partners are creating ads that follow you around the internet and buying up space on all kids of websites, including social media platforms like Facebook and Twitter.

Read the rest of entry »

ThrottleNet's Top 10 Tech Gifts Under $100

top-10-tech-gifts-under-$100-santaGreat technology is becoming more affordable, and that’s a great sign, considering everyone on your list wants the latest and greatest gadgetry available.

ThrottleNet has compiled a list of 10 affordable tech gifts available for under $100. Spread some holiday cheer and give the gift of technology this year, by considering any of our top 10 tech gifts under $100 available through various retailors.  

Read the rest of entry »

Understanding the Economics of IT

Are you confused about how much you should spend annually on IT? Does your budget allocate too much or too little for IT support?  

In part one of a two-part series, Eric Aguado, a partner with ThrottleNet, appeared on TNtv to discuss how a business can create a baseline to plan for annual IT expenditures.

Aguado cited a study from Gartner, the large research firm, which released a report called Gartner IT Metrics Data. The survey details by industry the percentage of annual revenue a company spends on tech support.

Read the rest of entry »

What Is Net Neutrality and How It Will Affect You?

Do you understand the meaning of “net neutrality”?  Do you have an opinion of how government and business can work together to maintain free, open high speed access on the Internet despite more and more traffic?

Mike Heil, a partner with ThrottleNet, appeared on TNtv to discuss net neutrality and why it’s becoming a major issue.

Read the rest of entry »

Will Chip Technology Really Make Your Credit Card More Secure?

By George Rosenthal

The government is promising to make your credit cards more secure. In fact they are going to require that every card have an embedded chip built-in by fall of 2015.

The goal is provide better security than the old swiping method and hopefully avoid the problems of fraud caused by hackers at Target and other retailers. 

The old swipe machines will eventually be laid to rest...

Read the rest of entry »

It’s Time to Put Down the Shovel and Stop Digging IT Holes

Are you married to the old ways of managing your technology even though new solutions can improve performance while saving you time and money?

Mike Heil, a partner with ThrottleNet, appeared on TNtv to discuss the mistakes business owners make by continuing to throw dollars at the same old, out-dated technology. 

Heil said there are four reasons why business owners continue to dig themselves deeper into an IT hole.

These include…

Read the rest of entry »

Bring Your Own Device Security Risks & BYOD Policy: Making It Work for Your Business

bring your own deviceTechnology is making Bring-Your-Own Device (BYOD) a part of everyday office life. More and more companies are allowing BYOD, and many of those companies are actually encouraging employees to bring their personal smartphones and tablets to the office.

A BYOD policy isn’t an employer giving their employees permission to waste away the day playing Angry Birds, or kick back and watch the big game like the kangaroo in the Dish Network commercial. Bring-your-own-device is a privilege for many employees and companies expect their employees to use their devices for work-related activities.

There is a huge trust factor that goes into BYOD, and it’s not only related to keeping employees engaged and focused on the task at hand. Bring your own device security issues are another factor to consider.

Read the rest of entry »

Securing the Internet of Things

securing the internet of thingsThe “Internet of things,” or IoT for short, is quickly becoming a commonly used phrase by folks in the technology world. It’s a buzzword that relates to everyday objects that we wouldn’t normally expect to be connected to the Internet becoming well…connected to the Internet.

There are so many cool, somewhat bizarre, but also, very intriguing objects out there that have fallen under this general umbrella called the Internet of Things that have become connected.

Now, cars, thermostats, wristbands, watches and refrigerators are all online – and more and more devices are finding ways to utilize the Internet.

The Internet of Things is great. It’s trendy, it’s a phenomenon, and in many cases, the Internet of Things makes our lives easier, helping us accomplish tasks quickly and efficiently using “things” that can receive data and process commands from a remote location. Who hasn’t wanted a refrigerator that tells you you’re running low on ice cream? Did you even know a refrigerator could do that? Well, now you do, and you want one, now.

Just like computers, things connected to the Internet need to be secure. As the Internet of things continues to evolve, Internet of things security is something we have to become more and more aware of.  We’ve seen machines attack before in the movies, after all.

Read the rest of entry »

When It Comes to IT: Don’t Settle for a Jack of All Trades

Is your IT person a jack of all trades but a master of none of them?

Kevin Banks, Virtual Chief Information Officer (VCIO) with ThrottleNet, appeared on TNtv to discuss the mistakes business owners make by entrusting anything and everything related to technology to just one person.

Many companies make the mistake of...

Read the rest of entry »

Pages: Previous1234567...14NextReturn Top
Copyright 2014 by ThrottleNet, Inc. All rights reserved, 9201 Watson Road, Suite 350, St. Louis, MO  |  Privacy Statement  |  Terms Of Use