Blogs

Blogs
Advanced Search
  • June 20, 2018

    Hate leaving behind your furry friend while you trudge through the hours at work? Increasingly, businesses are allowing their employees to bring their pets to the office...View Post

  • June 20, 2018

    Since 2011, SteelHouse CEO Mark Douglas has had two policies that have transformed the way his company operates...View Post

  • June 20, 2018

    Your biggest security vulnerability may be coming from within your organization – from simple gaffes to angry employees with rights to access your business’ information. The Harvard Business Review reports that as many as 60% of data breaches and cybersecurity incidents come from inside an organization...View Post

  • June 20, 2018

    When you hear about a successful cyber breach, you tend to assume it was perpetrated by malicious outsiders – but that’s an erroneous conclusion. Almost half of enterprises are actually more concerned about internal than external threats. As a point of fact, one out of every three enterprises suffered through an insider cybersecurity attack within the last year, according to a recent survey. Given this, it’s not surprising that three out of every four enterprises (74%) feels vulnerable to insider threats...View Post

  • June 19, 2018

    To serve and to protect – that’s the mandate for today’s police, firefighters and first responders. With cities becoming more crowded and threats on the rise, effective security and emergency response is a priority for state and local governments. Increasingly, these agencies are turning to technology to get the job done – which is why an evolution of 9-1-1 services is so critical...View Post

  • June 11, 2018

    During tax season, Steve Merritt’s accounting firm is extra busy. Tax returns stack up and the phone rings off the hook....View Post

  • June 11, 2018

    Bootstrapping a small business or setting yourself up as a full-time solopreneur usually means taking some financial risks – and, for a while anyway, a few financial hits. Some are necessary investments in your long-term success; others may be due to inefficiencies or poor strategy in those crucial early days. Here are a few ways to rev up cash flow when every penny counts...View Post

  • June 11, 2018

    The Westmoreland Library Network, which provides support to the 24 county libraries, received $650,000 in grant funding from the Andrew W. Mellon Foundation and the federal government, and has been using it on technology upgrades over the last year...View Post

  • June 7, 2018

    “Innovation” is one of the business world’s most beloved buzzwords – but how often do we stop and ask ourselves what the term really means?...View Post

  • June 7, 2018

    In “What a CIO needs to know about initial coin offerings,” I discussed Initial Coin Offerings (ICOs) and how they can be a viable alternative to raising funds. ICOs allow businesses to launch their own cryptocurrency in exchange for capital from interested buyers...View Post

  • June 6, 2018

    Imagine this scenario. You’re on your way to work. You’re late, but you need your daily jolt of java. One of the big-brand coffeehouses is right in your path, but you swerve onto a side street and over a couple of blocks because you know that your favorite indie coffeehouse will have your double-latte-soy-no-foam drink hot and waiting on the counter. All you had to do was turn the corner of their street. They knew you were on your way, and fired up the machine...View Post

  • June 6, 2018

    The thing about MPLS is that it’s a technique, not a service—so it can deliver anything from IP VPNs to metro Ethernet. It’s expensive, so with the advent of SD-WAN enterprises are trying to figure how to optimize its use vs. less expensive connections like the internet...View Post

  • June 6, 2018

    Cities around the world are looking to technology to make their cities smarter and more sustainable. From smart grids, urban wind power, geothermal energy and smart lights, the modern city is becoming greener, more connected and aware of the importance of sustainable infrastructure for growth...View Post

  • June 6, 2018

    I used to feel uncomfortable when talking about my work. I thought it came off arrogant and would drive people away. Once I dabbled in entrepreneurship, I quickly realized that self-promotion is part of the deal. You have to be prepared to talk about yourself and what you do to get people interested. Whether you’re a freelancer, a business owner or a serial side hustler, self-promotion is crucial to attracting clients, and ultimately, making sales...View Post

  • May 31, 2018

    As a manager, the success of your role is founded on building strong and trustworthy relationships with your colleagues and employees. The key to getting this right is being aware that the way you communicate in the workplace directly impacts the quality of relationships you form. And, that it’s not what you say, but how you say it that matters...View Post

  • May 31, 2018

    Getting certified as a woman-owned business takes grit and tenacity. But it can potentially help land women entrepreneurs more business opportunities and government contracts...View Post

  • May 31, 2018

    Aged just 12, he must be the UK’s youngest CEO, yet Jenk Oz, founder of iCoolKid, has the confidence of a seasoned boardroom executive several times his age, expects his company to turnover £50,000 before his next birthday, and has plenty of startup advice for other budding young entrepreneurs...View Post

  • May 31, 2018

    Service-level agreements (SLAs) are contracts that outline how a service is delivered to a customer, made popular decades ago in the telecommunications industry. With the rise of cloud-based providers – and the fact that over 90% of businesses use the cloud – the importance of SLAs has multiplied...View Post

  • May 24, 2018

    Healthcare organizations are main targets for hackers. These institutions are rich troves of data, routinely collecting and storing information about personal identification, health records and finances such as credit card numbers and bank accounts...View Post

  • May 24, 2018

    With security being a major concern among businesses of all sizes, IT staffs are continuously working to identify vulnerabilities in their systems. Recently, Voice over Internet Protocol (VoIP) phone systems have been identified as possible sources of significant security challenges for organizations. Here are the top security challenges you face with a VoIP deployment, and how the move to Hosted VoIP mitigates them...View Post

  • May 24, 2018

    For state and local governments, it’s hard just keeping up. With tightening budgets and largely overworked staff, the IT network is often an afterthought. That’s a problem considering every government program, every agency, every worker is dependent upon the reliability and availability of the foundational IT network...View Post

  • May 24, 2018

    Cybercrime is on the rise. All companies in all industries are at risk. But financial services firms have suffered the most. They were successfully attacked—yes, that means actually breached—65% more than the average organization in 2016. The number of financial services records stolen ballooned 937% to more than 200 million. And 2018 looks like it will be more of the same...View Post

  • May 22, 2018

    If you have an Amazon Alexa, you can now find out how to renew your driver’s license with a simple question to Alexa. The State of Georgia is the first state to integrate Amazon Echo into its digital services platform. Calvin Rhodes, CIO of Georgia, recognized this trend a number of years ago, and appointed Nikhil Deshpande to lead the Office of Digital Services for the State of Georgia...View Post

  • May 22, 2018

    Crisis planning is integral to many cities across the planet and we see it in use when natural disasters strike. When the magnitude 9 earthquake hit Japan in 2011, previous disaster planning kicked in. But the response has been criticized because of the predictive limitations that informed the disaster recovery attempts. Other criticisms highlighted too much emphasis on using ‘hazard maps’ which were inaccurate. If our starting points are off point, then our disaster recovery will also be lacking...View Post

  • May 22, 2018

    Smartphones are quickly becoming one of the most important devices for business employees. In some industries, smartphones have already become more predominant than laptops, particularly for employees in the field. Initially used simply for email, smartphones now host numerous company-specific applications that enable users to manage everything from travel planning and expense reporting to CRM and BI...View Post

Contacts

News media inquiries about CenturyLink should be sent to News.Media@CenturyLink.com

 

MORE »

Subscribe

Customize your newsroom email alerts.

CLICK HERE »