Blog

How Cloud CRM Helps Manage Your Growing Business

Small business owners have a lot to juggle every day. The ability to balance essential daily operational tasks with the activities that grow the business is a must. One of the keys to a successful business is attracting new customers while retaining your current clientele—because happy/existing customers are also a great source of new busine...

Phishing for Corporate Gold with Social Engineering Attacks

Completing our look at the 7 common-sense cyber protections with #5 and #6: #5 DO NOT open emails, links, or attachments from strangers – especially if the email demands urgent action from you. Stop and think, that email could be a "phishing" email from a cyber attacker #6 DO NOT give any of your usernames, passwords, or other computer...

How Better Mobile Apps Make You More Productive

More than ever, the modern workforce is unshackled from desks in an office. Thanks to smartphones, nearly-ubiquitous Internet access in most populated areas, and the cloud, the "work from anywhere" dream is basically now a reality. Mobile working is quickly becoming the new normal, with analysts predicting that 72 percent of the United States' tot...

Instant Efficiency Gains With Updated Active Directory Data

Millions of businesses around the world either have used or are using Microsoft Active Directory (AD) services on their corporate networks. Used to identify and manage authorized network users, AD has been around for over fifteen years. However, few companies take full advantage of AD's capabilities in the social media age. With a few simple tweak...

Just what is a complex password (and how do I create one)?

In a previous blog, I discussed seven common-sense cyber protections you can do that immediately and inexpensively make you, your business, and your family safer from cyberattack. So far, I've covered #1 – Keep your software patches up to date and #7 – Do not give your primary user account administrator privileges, and #3 – Back up your computer d...

Bye Bye Sales Guy

From Philip K. Dick’s “Do androids dream of electric sheep” (1968) to the recent “Black Mirror” (2016) sci-fi series on Netflix, authors have been postulating different life scenarios impacted by technology. This same artificial intelligence responsible for rogue computers and robots on TV shows are now capable of mastering real world tasks th...

Which is worse: #ransomware or hard drive failure?

It’s a trick question. Both impact your business the same way – you lose access to your valuable business data when you are not expecting it. One of the most important things you can do about cybersecurity is to stop thinking about it like a mysterious disease whose only cure is to buy specialized protection software. To be sure, some businesses that...

Listen To Rosalyn Arntzen, CEO Of Amaxra On The She Did It Her Way Podcast

Our founder and CEO, Rosalyn Arntzen, sat down for an interview on She Did It Her Way, a weekly podcast for and about female entrepreneurs. During the podcast, Rosalyn discussed: Where she developed her leadership style What life changes she made to maintain the high energy levels needed to run a business How she went from owning her own ...

7 Common-Sense Cyber Protections That Really Work

We all use the Internet regularly to communicate with colleagues, share vital information, and carry out our business duties. Think of trying to get through your workday without access to your e-mail, your documents, or your spreadsheets. Nevertheless, that same Internet we depend upon is viewed by cyber criminals as a pathway into your company – one ...

3 Tips For Job-Hunting Consultants: How To Get Constructive Post-Interview Feedback

If you're a consultant, then it's a given that you're always on the lookout for your next gig. While there are plenty of online resources to help prepare you for the big interview, what often gets lost is what to do when you don't get hired. Obviously, nobody wants to be rejected, but there are often teachable moments that you can find and use dur...