Questions to Ask About Me If I’m a Professional Consultant

Do you know somebody who knows me? Are we “linked” somehow? Here’s what I think you should generally ask that person: Does he know his stuff? Can he solve problems? Does he listen? Does he ask good questions? How long has he been doing it? Is he “sharp”? Is he effective? Is he resourceful? Does he […]

3 Ways to Boost Mobile Security

Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security. Securing mobile devices has become increasingly important in recent years as the numbers of the devices in operation and […]

Agile Solutions for Everybody!

A long, long time ago, when The Internet Design Firm existed (Scott Smeester’s 1990s startup), consulting firms used to get into LONG and BIG contracts, for HUGE amounts of work. They used to generate big ‘ol requirements, and create phases in the project to make sure there was no scope creep! Changes?! Pfftt! In 2002, Mr. Peter […]

How to Find the Right Help Desk Provider

Despite the importance of maintaining a high-quality help desk, a number of companies either don’t have the internal resources to do so, or struggle in finding an outsourced vendor that is truly high quality. By asking the right help desk qualification questions, you can be sure you’re choosing a vendor who will meet your needs and the needs of your clients.

Your Fiduciary Responsibility to Your Client’s Data

Make the most responsible choice to protect your client’s data, regardless of what they think is the best method. They’re not the experts. I saw Leonard the other day, and he started the conversation off like he always does; “what are your thoughts about storing data in the cloud, like Google or Dropbox or something? […]

4 Immediate Action Items Following a Ransomware Infection

  It is always best to do everything you can to stop your computer from getting infected with any malicious software. Taking some simple steps, like having adequate security software (antivirus and anti-malware) installed on your computer, applying OS security patches, not clicking on suspicious email links that you don’t recognize and not opening unexpected […]