Top 3 Reasons to Consider Cyber Security

In the technological age, cyber security has never been more important. If you pay any attention to the news, you’ve probably seen big companies hit by cyber-attacks. Unfortunately, for smaller businesses, this isn’t just a problem for larger scale companies. In fact, the majority of businesses that end up affected by cyber attacks are small to mid-sized business. Here are three reasons why cyber security is crucial to preserving your business. The Cost of a Breach Cyber crime costs businesses a lot of money. The average cost of cyber crime…

Read More

Ask Strategic Questions When Considering New Church Software

  Churches looking for a technology system have hundreds of packages and configurations to choose from. So, how does a ministry choose the best church software for its needs? By considering more than features and functions. Often, software is chosen based largely on features and functions. But it’s wise to start at a higher level and ask questions that will help define the system’s role in supporting your church’s strategy. Answers to the following questions will help provide insight on how new software could impact your ministry strategy. Why Does…

Read More

Facebook Tests Posting of Instagram Stories as WhatsApp Statuses

  Facebook is running a small test to let users post their Instagram Stories directly to WhatsApp Status. The new feature will let users post decorated photos, videos, and GIF images from Instagram on WhatsApp, which will disappear after 24 hours. “An Instagram Story posted as a WhatsApp Status also becomes encrypted like the rest of WhatsApp,” TechCrunch reported on Wednesday. The feature is based on publicly available code that WhatsApp makes available for third-party apps. “Users get an option to tap to share to WhatsApp from the Instagram sharing screen, but they still have to press Send in WhatsApp to post the…

Read More

John McAfee, Cyber-Security Pioneer, Says His Twitter Account Was Hacked

  Ace computer programmer and businessman John McAfee’s has said that his Twitter account was hacked and was used to run ‘coin of the day’ series recommending and promoting lesser-known cryptocurrencies. “Though I am a security expert, I have no control over Twitter’s security. I have haters. I am a target. People make fake accounts, fake screenshots, fake claims,” he tweeted. “I am a target for hackers who lost money and blame me. Please take responsibility for yourselves. Adults only please,” he posted this message with a screenshot of his device which showed his…

Read More

WhatsApp on New Year’s Eve: 20 Billion Messages Sent in India, 75 Billion Worldwide

  WhatsApp users in India sent over 20 billion messages on December 31 as they ushered in 2018 with wishes to family and friends. In a release, WhatsApp revealed that of the 75 billion messages shared on New Year’s Eve, 20 billion were just from India. These figures the highest-ever number of messages shared on the platform, which has over 1 billion users worldwide and counts India as its biggest market with 200 million users. It is notable that WhatsApp suffered an outage lasting more than an hour late on December 31, 2017…

Read More

WhatsApp Private Reply Feature for Groups Enabled by Mistake, Expected Soon: Report

  WhatsApp mistakenly rolled out the ‘Reply Privately’ feature in a beta update for Windows Phone that will allow users to privately send a message to a participant in a group without anyone else knowing about it. The hotly-anticipated WhatsApp feature is under development and could be rolled out with other features as well. The Private Reply feature appeared and was subsequently dropped from the beta version of WhatsApp, watcher of the popular chat app @WABetaInfo said, confirming that the developers wrongly enabled the feature. “In the new WhatsApp beta for Windows Phone…

Read More

Facebook Could Stop a Disease Outbreak, Say Researchers

  Facebook accounts and telephone records can be used to pinpoint the best individuals to vaccinate to stop a disease outbreak in its tracks, researchers said Wednesday. Such people would be “central” in their social networks, and thus likelier to spread disease-causing germs from one group to another. Assuming there is an outbreak, and not enough vaccines for every person in the world, immunising these well-connected individuals would remove social “bridges” by which germs can spread, experts wrote in the Journal of the Royal Society Interface. The study, which tracked the…

Read More

WeChat Denies Storing User Chat Histories

  Tencent Holdings’ WeChat, China’s most popular messenger app, on Tuesday denied storing users’ chat histories, after a top businessman was quoted in media reports as saying he believed Tencent was monitoring everyone’s account. “WeChat does not store any users’ chat history. That is only stored in users’ mobiles, computers, and other terminals,” WeChat said in a post on the social media platform. “WeChat will not use any content from user chats for big data analysis. Because of WeChat’s technical model that does not store or analyse user chats, the rumour…

Read More

Facebook Faces Flak for Removing ‘Birth Becomes Her’ Video

  Facebook is facing criticism from fans of birth photographer Monet Nicole Moutrie after her ‘Birth Becomes Her’ video that amassed over 100 million views over a period of seven months was removed from the social media platform. With no notice, Facebook has removed the video, Cosmopolitan reported on Monday. Reacting to the Facebook response, many users are sharing the video again. “Monet Nicole Moutrie was banned from Facebook again, this time for this video. Share far and wide!”, wrote one user. Making her dissatisfaction public, Moutrie said in a blog post that the video was removed…

Read More

10 Tips On How To Write A Business Email

Utilize an Informative Subject Line The title is the primary thing that a beneficiary finds in an email. More often than not, they see it before opening the email itself, as relying upon the email customer, the subject and beneficiary is appeared before the whole message. The subject ought to give enough data about the email so the beneficiary recognizes what it is about it before opening. A subject, for example, “Survey” or “Archive” is exceptionally unclear and doesn’t generally offer assistance. Be that as it may, a subject, for…

Read More