Empty Cart

News & Blog

What We Say

Is Act! for Web Secure?

We get this question a lot, so I thought it would be a good idea to document it here. You have several options with Act! Premium. You can self-host your database - which is what is called Act! Premium for Web, or you can pay to host your database "in the cloud." In this article, I'm just going to cover security precautions we recommend for clients running Act! Premium for Web and allowing Internet access to their Act! database.  If you are using Act! Premium for Web solely inside your

Not ANOTHER password

Compromised password emails abound these days. I'm sure you've seen them..."your account has been compromised...I know your password...send money." Many of my clients ask how could this happen? Well, data breaches are dismayingly common.  If you've been using the same password for multiple website/services, you are at risk personally and in your business. Here are some good tips that you've probably heard before: never re-use passwords don't use common passwords such as "password" and

GDPR - Why you need to prepare now

You have probably been hearing quite a bit about GDPR - the European General Data Protection Regulation. What you may not realize is if you have European contacts that you interact with and store their data, you need to understand how that can potentially impact you via heavy fines. The biggest point of GDPR is protection of personal data - at a much deeper level than is practiced in the US. An individual is in control of their data - not the other way around, even to the point where they should

Don't be a victim of Act! data loss

Recently, we have had several frantic calls from customers needing to restore contacts in Act! after a user has unwittingly deleted them. Unfortunately, in some cases, these clients haven't had a recent backup of their Act! Database to pull the deleted contacts from. Don't let this happen to you. Follow these guidelines to protect your Act! data: Limit user security to ONLY what the user NEEDS to do their job. It is a misconception that users need to be "administrators" in Act!. The

3 easy strategies to protect your business and data

We all know that procrastination can get you into trouble. You can lose data if you don’t backup your computer/database, you can lose a customer if you don’t follow-up when you said you would, and you sure don’t want to be at a meeting at the wrong place on the wrong day or time. So what can you do? Act! to the rescue! Use the Act! Calendar and Task List Have you ever gotten to the office and thought, “I know there was someone I was supposed to call” but you cannot remember who it was

Is it legal to monitor employee emails?

[caption id="attachment_4711" align="alignright" width="300"] Is it legal to monitor employee emails.[/caption] Last week I got an interesting email from a client regarding the legality of monitoring and reading employee emails. There were some internal issues that were causing concern and they wanted to know what tools to use and how to go about implementing the process. Before looking into tools, I wanted to ensure that it was legal at all. The answers I found turned out to be a bit more

Phishing incidents on are the rise. What can you do to avoid the taking the bait?

Over the last few years there phishing incidents have been on the rise, playing havoc with many small business and individual users. Even large businesses can be a target. The only way for a computer user to avoid these threats is to recognize a phishing email/phone call and know what to do (or not do). To understand what these threats are let’s start with the basics: What is Phishing? Phishing is an attempt to get someone to give sensitive information such as username, password, and

How do I get a lock on my website: an SSL primer

You may have heard about SSL, and you may even have SSL implemented on your website already. If your customers enter sensitive credit card information or other private data on your website then SSL is a must. If you haven’t heard of SSL, we’ll answer basic questions in this article and provide resources for you to learn even more. What is SSL Transport Layer Security (TLS) and Secure Sockets Layer (SSL) [the precursor to Secure Sockets Layer] are both

Patricia Egen Consulting, LLC

803 Creek Overlook, Chattanooga, TN 37415
Main office: 423-875-2652 • Arizona office: 480-788-7504 • Florida office: 754-300-2827
support@egenconsulting.com