Recent Posts

Toe the Line on Do Not Call

Lots of businesses rely on telemarketers to sell their products and services. If you’re one of them, you’ve probably heard of the National Do Not Call Registry, which gives people the right to limited unwanted telemarketing calls. Did you know people have placed more than 200 million phone numbers on the Do Not Call list?

Read Full Post >>

UN-surance

Many smaller companies want to extend health benefits to employees, but are concerned about keeping the price affordable.  For people who own their own business or are looking for work, cost-effective coverage can be tough to find.  If you’re in the market for health insurance, make sure that’s what you’re buying.  Some programs pitched to small businesses, the self-employed, and the uninsured sound like affordable health insurance, but actually are medical discount plans.  Although some plans may offer legitimate savings, others take people’s mon

Read Full Post >>

Admongo

You fought off a hostile takeover and went toe to toe with the most aggressive competitor in the business. But now you’re facing the toughest crowd of all: a classroom of fifth graders at the local elementary school’s Career Day.  No need to be frozen with fear when Admongo – an online videogame that educates kids about advertising – is just a click away.

Read Full Post >>

The Dupe of URL

No, not the doowop song by Gene Chandler, but a form of fraud aimed at small businesses and non-profits. Here’s how the scam works: Con artists send fake invoices to businesses, listing the domain name or URL of the company’s website or a slight variation – like substituting ".org" for ".com." The bills, designed to look like they come from a domain name registrar, say the company owes money for its annual "website address listing" and "search optimization" service.

Read Full Post >>

What's Your P2P Policy?

You’re looking at a website right now, but what else is open on the toolbar at the bottom of your screen? Customer spreadsheets? Financial documents? Confidential memos? What’s the risk that a hacker is looking over your virtual shoulder to steal data that could be used to commit fraud or ID theft? The answer may depend on your company’s policy toward peer-to-peer (P2P) file sharing.

Read Full Post >>