How Social is Your Customer Service?

Tell us for your chance to win an iPad mini.



March 03, 2015
Uber is providing impacted drivers with one year of f ree credit monitoring services and will be filing a “John Doe” lawsuit so they can more effectively gather breach-related information in order to determine the responsible third-party.
March 02, 2015
Mobile payments. We’ve seen through news coverage, conversations with friends and family and our own usage how pervasive this technology has become this past year. To go beyond the buzz, MasterCard partnered with Prime Research , to identify evolving consumer attitudes toward digital payments and...
February 24, 2015
Citizenfour, the documentary on Edward Snowden's data release of U.S. Government surveillance programs, brought terms like "Deep Web" and "Dark Net" into our daily language. But what are these things and how do you access them?
February 19, 2015
It’s not so much the data breach itself that businesses should be concerned about, but the aftermath. Would your organization survive?
Rebuilding After a Breach
February 09, 2015
In January, Symantec observed an unusual amount of phishing emails targeting LinkedIn users. These phishing emails have been attempting to get users to give up their passwords to the criminals.
February 02, 2015
The recent events in Paris demonstrated how powerful so-called “dark social media” can be, when it comes to organizing propaganda below the radar. The growing interest from political bodies for this notion of underground social conversations could legitimize privacy threats to better monitor digital users. Nonetheless, even if the notion seems to have been only recently coined, “dark social” started ages ago, with instant messengers, and later, newsgroups. It did not seem to be a problem until now.
January 28, 2015
Cyber attacks on small business are more common than you might imagine. Here’s how they happen and what you can do to stop them.
January 27, 2015
The mobile phone has long since graduated from being a device that purely enables person-to-person voice communication. The role of the smartphone is far more expansive, as it has become embedded into lifestyles -- used to surf the web, take photos, connect to social networks, get directions, etc.
January 25, 2015
Encrypting the internet has been the topic of much discussion. You have people telling you about the need to encrypt to protect our way of life, as well as, those who talk about the untold marketing benefits promised to us by the Google gods.
January 21, 2015
In the world of enterprise, social media, and digital business, the cloud has had its moments of gaffe – from minor hitches like Google going down for a brief period, or Facebook falling flat, to more nefarious acts of data violation like the data theft of nearly 40 million credit and debit card details from nationwide stores of the retail giant Target. The cloud has definitely had some growing pains.