Business Growth: Technology

backup

How to develop a backup storage plan for your business

With storage being cheap and plentiful, SMBs process more data than ever before. It also means that loss of such data can hit the business hard in the hip pocket….

Mark Reinert

The second cure for a lean purse…

Continuing the story from our previous post, the wealthy Arkad from George Clason’s “The Richest Man in Babylon” was sharing his formula in what he called “The 7 cures for…

Topeka Landscape

Your Start-To-Finish Outdoor Contractor

A common misconception about professional landscaping companies is that all we do is cut grass and plant flowers. While we do enjoy the sight of well-manicured lawns and healthy landscape…

Biometrics

Are biometric authentication methods and systems the answer?

Are biometric authentication methods and systems the answer? Biometric authentication methods, like voice, fingerprint and facial recognition systems, may be the best replacement for passwords in user identity and access…

TK-Business-LIVE-LOGO

TK Business Live talks with Misty Kruger, Topeka Public Schools and Jennifer Kirmse, Topeka Independent Business Association, Chair

TK Live January 21st, 2018 Misty Kruger, Topeka Public Schools, Director of Communications Jennifer Kirmse, Topeka Independent Business Association, Chair

TK-Business-LIVE-LOGO

Checkout this weeks TK Business Live, sponsored by Topeka Independent Business Association

Tara interviews Erik Evans with Envista Credit Union and Clayton Devlin with Devlin’s Wine and Spirits on this weeks TK Business Live. Erik Evans, Envista Credit Union, Manager of Business Services…

keyboard

It’s time to go on the offense with your IT security

Cybersecurity is now a game of attack, not defense It’s said that the best defense is a good offense. This is particularly true in cybersecurity, where the average cost of…

EMBD-Logo-2
1.4 BILLION STOLEN

A massive repository containing more than 1.4 billion stolen credentials was found on the dark web with special features for malicious actors.

by Peter Loshin, Site Editor SearchSecurity, Published Dec. 12, 2017 Researchers found a massive repository of cleartext stolen credentials on the dark web that is the largest of its kind….

DOT rule makes the following significant changes

Kristina Dietrick, PHR, SHRM-CP If you are an employer who is required to comply with DOT regulations or HHS Mandatory Guidelines for Federal Workplace Drug Testing Programs, please be aware…