Is the Sky the Limit when it comes to ‘the cloud’?

Image

BSALH690F5

It seems more objects than not are connected to the internet in some way or another. Whether it’s traditional technology such as computers, laptops, tablets and smartphones, or the less expected items such as household appliances, toys, cars, and drones; with an internet connection comes the opportunity to save information to what is commonly referred to as ‘the cloud’. But with so many internet-connected-things, surely the cloud is going to run out of space at some point, right? Continue reading

How to Make a CRM Work for You

StockSnap_72ZCJJ8K6I

Common CRM Implementation Failures to Avoid

The uptake of CRM software is growing at a steady rate of approximately 13% each year over the last few years according to reports from Gartner (2014; 2015). And with good reason – CRM software enables companies to grow loyal relationships with their customers by allowing a better understanding, segmentation and tiering of their customer base, improved targeting of promotions and cross selling, and the implementation of alerts that signal a customer is about to depart. CRMs are a complex software that can deliver what many refer to as a ‘360 degree view’ of their customers. Continue reading

Is Cyber Security Now More Important Than Ever?

“Everything is hackable”, whistle blower Edward Snowden said of the newly introduced Australian meta-data retention laws, “So you hope the government agency or the third party provider has very high security standards”. If you’re not exactly sure what the meta-data retention laws are, they require telco companies to store records of phone and internet activity for two years and grant access to security and law enforcement agencies without a warrant. This includes the phone number of people you called or sent SMS messages to, time and date of calls and SMS, length of calls, the location of the nearest phone tower when you sent or received a call or SMS; and for internet activity: the time, date, size, sender and recipients of emails, time and duration of your web connections, your IP address, the volume of your uploads and downloads, location and geographical data.

According to the Australian government these laws have been introduced in an effort to enhance Australia’s security against terrorism and criminals. However it would appear that these new laws could actually reduce Australia’s cyber security. While the meta-data won’t record the content of your communications, there is still a lot of information that, if found in the wrong hands, could put Australians and businesses in a vulnerable position. Continue reading