Blog

Just what is a complex password (and how do I create one)?

In a previous blog, I discussed seven common-sense cyber protections you can do that immediately and inexpensively make you, your business, and your family safer from cyber attack. So far, I've covered #1 – Keep your software patches up to date and #7 – Do not give your primary user account administrator privileges, and #3 – Back up your computer ...

Bye Bye Sales Guy

From Philip K. Dick’s “Do androids dream of electric sheep” (1968) to the recent “Black Mirror” (2016) sci-fi series on Netflix, authors have been postulating different life scenarios impacted by technology. This same artificial intelligence responsible for rogue computers and robots on TV shows are now capable of mastering real world tasks th...

Which is worse: #ransomware or hard drive failure?

It’s a trick question. Both impact your business the same way – you lose access to your valuable business data when you are not expecting it. One of the most important things you can do about cybersecurity is to stop thinking about it like a mysterious disease whose only cure is to buy specialized protection software. To be sure, some businesses that...

Listen To Rosalyn Arntzen, CEO Of Amaxra On The She Did It Her Way Podcast

Our founder and CEO, Rosalyn Arntzen, sat down for an interview on She Did It Her Way, a weekly podcast for and about female entrepreneurs. During the podcast, Rosalyn discussed: Where she developed her leadership style What life changes she made to maintain the high energy levels needed to run a business How she went from owning her own ...

7 Common-Sense Cyber Protections That Really Work

We all use the Internet regularly to communicate with colleagues, share vital information, and carry out our business duties. Think of trying to get through your workday without access to your e-mail, your documents, or your spreadsheets. Nevertheless, that same Internet we depend upon is viewed by cyber criminals as a pathway into your company – one ...

3 Tips For Job-Hunting Consultants: How To Get Constructive Post-Interview Feedback

If you're a consultant, then it's a given that you're always on the lookout for your next gig. While there are plenty of online resources to help prepare you for the big interview, what often gets lost is what to do when you don't get hired. Obviously, nobody wants to be rejected, but there are often teachable moments that you can find and use dur...

Building Better Customer Relationships With The Cloud

It's a fact that architecture, engineering, and construction (AEC) professionals don't forge typical customer relationships. Engineers and construction managers are often on-site rather than in an office. Architects are in an office but the output involved in their jobs often makes it easy for them to overlook the many other aspects involved with ...

The 2 Things That Best Protect You From Cyber-Attack

We are excited to announce a NEW guest blog series by Dr. Ken! In future blog posts, he will discuss ransomware, encryption, and other critical cyber-security issues all business people need to know. Stay tuned! UPDATE Friday May 12, 2017: Massive ransomware cyber-attack hits 74 countries around the world says a headline in today’s UK Guardian news...

The Walled Garden

Safety in numbers. It is a proven survival principle that has, well, survived for eons. Encapsulated in this principle are many worthy lessons, such as implicit trust and resource pooling. These lessons are easily seen in the security concept of a Walled Garden. This defense model can be traced back to when 17th century townships were designed aro...

How Amaxra Uses PowerBI To Gain Customer Insights

Since 2014, I've been a fan of PowerBI, a suite of business analytics tools from Microsoft used to analyze data and share insights. As an early adopter—I was introduced to PowerBI while working with the Enterprise Commerce team at Microsoft so I've seen firsthand how the application evolved into an impressive business tool since its infancy....