Blog

How business continuity plans can fail

May 20th, 2016

Your service provider, who you have tasked with looking after your company’s IT, has kept your business up and running for the past 10 years. Usually, that kind of longevity in developing continuity plans has resulted to some providers overlooking or underestimating certain issues.

Are your site’s images hiding an attack?

May 17th, 2016

As more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now something you should be concerned about from a security standpoint.

7 Twitter tactics to get more retweets

May 13th, 2016

Managing your company’s Twitter account can be tricky. You have a lot of brilliant things to say in under 140 characters but the problem is getting more eyes on your tweets. What’s worse is that there are other companies competing with you to grab that attention.

Are you sufficiently cooling your servers?

May 10th, 2016

Every business sits on top of a foundation of different building blocks that enable it to operate smoothly and efficiently. One building block that is becoming increasingly essential is IT hardware. Server hardware can be expensive, which is why proper management is vital.

Are you using this effective marketing tool?

May 3rd, 2016

There are many marketing techniques SMBs use to gain clients. Free information products, brochures, and press releases are just a few among many. But how do you know what’s most effective? It all comes down to looking at data and seeing for yourself what’s worked before.

Understand these 4 types of hackers

April 28th, 2016

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you need to protect.

How to pick the best mouse

April 26th, 2016

The good ol’ two button mouse just won’t cut it anymore. They’re unresponsive, uncomfortable and the cord somehow ties itself up every time you put it in your bag. However, buying a new mouse can be a pain, especially when you don’t know what to look for.

Tips to get to 500+ LinkedIn connections

April 25th, 2016

Most people are still impressed when they see a LinkedIn profile with 500+ connections. It gives that person authority in their industry and shows they’re a valuable member of the business world. In other words, 500+ connections can help sell you and your business.

Boost staff productivity with mobile tech

April 18th, 2016

Most business owners are quick to think that utilizing mobile devices automatically leads to more productivity. Unfortunately, this is not always true. A poor mobile device policy can actually lead to burnout and see your employees become overwhelmed by technology.

The 1st recipient of the Brian J. O’Connor Award : Andy Hardecopf

April 14th, 2016

2016 Honoree - Andy Hardecopf

We are pleased to announce our 1st recipient of the Brian J. O'Connor Award, Andy Hardecopf!

This award was established in 2015 to honor the memory of Brian J. O'Connor. The purpose of the award is to recognize an outstanding leader in the Veracity Technologies organization who, by their actions, emulates a commitment to service excellence through hard work, extraordinary customer care and a passion for self-improvement.