Looking around Amann Business Systems’ office you can see the history. George Amann’s grandparents, Helen and Howard Amann, opened their doors in 1937 selling and servicing typewriters right here[...]
It has been a long week of parading. Time to get back to work. If you are like me, it is not a jump out of bed and hit the ground running sort of morning. It’s more like a where’s my coffee and[...]
Ransomware wants your data and your money. If you own a small to mid-sized business and still think bigger companies are better targets, you might want to think again.
As 2017 winds down, we are looking ahead to see what the technology landscape looks like for small businesses in 2018.
The scroll was delivered by a town crier with a nice surprise to boot.
If you use Uber, your personal data along with 57 million other Uber accounts might have been compromised. Uber, who paid hackers $100,000 to hide the data breach that happened in 2016 is still[...]
Entrepreneurs always follow the money and it seems this applies to the criminal world as well.
Businesses are quickly deploying all kinds of technology. Different kinds of technologies come with different risks and strategies to protect them. This checklist is designed to help you identify[...]
Cybersecurity is more a people problem than it is a technical one. Many of the losses you read about could be prevented if people better understood how security works.
There are 7 key areas of[...]
As a business in Louisiana, we know very well what it's like to operate during hurricane season. Unfortunately, at any moment, a business can lose all of its vital data. That's why it's so[...]