Entries by Ivana

How Small to Medium Sized Businesses Can Use Video Content Marketing

For a long time, content marketing has been a key channel in any successful online strategy. Quality, unique content is the best way for companies to increase their social signals, obtain natural inbound links and engage prospective customers en masse. Recently, more and more brands are turning to video content marketing. And for good reason: […]

A Startups Guide To Bring Your Own Device Policies (BYOD)

By 2017, one in two firms will no longer provide devices for use by their employees. Under deliberate or default “bring your own device” (BYOD) policies, an increasing number of employees are using their own phones and computers in the workplace rather than hardware owned by their employer.In a 2013 study conducted by Dell, 59% […]

Keeping Computer and Network Safe for SMEs

We’ve all heard of the most recent cyber attacks; Ashley Madison, David Jones and K-mart to name a few. What many people haven’t heard is that in 2014, 60% of targeted attacks hit small and medium businesses1. So why don’t we hear about the smaller scale incidents? In Australia, it’s not mandatory to report cyber attacks. To avoid […]

Why You Shouldn’t Be Disappointed After a Startup Failure

The quality that best characterizes business owners is passion; it sets the engines of entrepreneurship rolling with the proprietor behind the wheel. It’s the same passion with fuels the drive to attain his purpose and achieve his vision. But every business venture starts out as an idea. Entrepreneurs will always believe they have stumbled across […]

Working with Family Members

My husband and I purchased our company, River City Trees, when our youngest son was only 1 year old and have been working together ever since.  When we first started working for ourselves Bart was in the truck full time and I looked after the office.  Since then we have managed to grow our business, […]

Secure Your Business From Data Breaches

Identity theft is increasing on a global scale, with financial information and client records considered foundational data for cyber criminals that indulge in this practice, whether for strict financial gain or use in fraudulent transactions. The normal practice is that harvested data is used to create other accounts (such as bank, email or other) or […]