Dell acquires Credant Technologies for device encryption

Dell is acquiring data encryption vendor Credant Technologies in a move that it said would strengthen its data protection offerings for laptops, mobile devices and cloud computing initiatives.

Financial terms of the deal were not disclosed.

Addison, Texas-based Credant Techologies sells file and folder-based encryption and recently added full disk encryption to its portfolio. In addition to supporting the Windows and Mac OS X platforms, Credant can provide encryption for Apple iOS devices. It also supports encryption using the Trusted Platform Module (TPM) chips found in laptops, some smartphones and embedded systems.  The company's management software also supports BitLocker.

The company has maintained a close partnership with Dell, integrating Credant full disk encryption within the Dell BIOS, according to a recent research report from Gartner. Dell said the acquisition gives its customers the opportunity to be flexible with encryption deployments, choosing between FDE and file and folder encryption as well as simplified management for more complex deployments.

“The Credant assets will complement and extend current Dell device security features to make Dell Latitude, OptiPlex and Dell Precision computers among the world's most secure,"said Jeff Clarke, president, End User Computing Solutions at Dell in a statement. "When combined with the change in compute behaviors and data in-flight, Dell can now offer a differentiated security proposition based on its own intellectual property.”

Bob Heard, founder and CEO of chief executive officer and founder of Credant praised the deal, indicating that the company will be more exposed to Dell's customer base. "Together,we will continue to focus on innovation and building value that result in beneficial outcomes for our customers,” he said in a statement.

Credent competes with McAfee, Symantec, Check Point and Sophos which provide data encryption for devices. Microsoft also provides BitLocker, which supports hardware encryption in Windows 8.




Trust a significant issue for cloud services, survey finds

Trust is a significant problem for the still fledgling cloud services industry. While the benefits that can be realized by outsourcing costly data storage to managed service providers are readily apparent to most, lingering security concerns have left many organizations reluctant to take the leap of faith required to make the move to the cloud.

You have to make sure cloud service providers use all possible protection measures available.

David Maman, CTO, GreenSQL

A recent survey of 387 attendees of two cloud security webinars conducted by database security provider GreenSQL found that more than 80% of respondents still have serious apprehensions about adequate security, regulatory compliance, and the loss of control over sensitive data that they may experience when migrating data to the cloud.

Lack of trust in the cloud

The GreenSQL study focused on one overarching question: “What is your main security concern when moving your database to the cloud?” Thirty-one percent of those surveyed indicated that they simply do not trust the level of security that is currently provided by cloud data storage services, and for good reason. The move to the cloud means having confidence in the ability of the service provider to maintain segmentation on vast network platforms which are simultaneously accessible to multiple clients.

“If your corporate systems were going to be used by another company you don't know and you had no idea of the purpose for which they are using your hardware, would you put security second?” asked GreenSQL CTO David Maman rhetorically. “The painful fact is that most of the time, as a cloud customer, you will be sharing the same hardware and network with others, which means that security must come first.”

The challenge faced by cloud storage providers is exemplified by the study's finding that 22% of the respondents expressed ongoing concerns over the perceived loss of direct control over sensitive data once a database is placed in a cloud environment.

“The core of your business is the information you store - your customers' data and your company's financial information. The majority of the time, that information is stored inside of a database. If information is the real currency of your business, then the database is the safe storing this currency. Therefore, you have to make sure cloud service providers use all possible protection measures available,” Maman said.

Maman also points out that although cloud service providers are managing and monitoring your data, the security of the database once it is in the cloud does not automatically become their sole responsibility. Organizations must maintain a proactive approach to safeguarding sensitive data through monitoring and the development of effective policies and procedures for access control to ensure the data remains secure.

“When you install your own database application or use a database-as-a-service such as Microsoft SQL Azure, you have to take control of your information, which means enforcing a database firewall,” Maman said. “You have to enforce separation of duties, you have to enforce database activity monitoring and you have to mask any sensitive information.”

Another question plaguing thecloud services industry is the issue of data backup mechanisms, and exactly how the information stored in the cloud is protected from being misappropriated or lost altogether. Can any organization really be sure that backups are being stored on a single tape or other media device designated specifically for them?

“Let me save you the trouble of over thinking, it's not.” Maman says. “Your back-up information is saved along with thousands of other customer's data on whatever affordable backup media is available. Of course, you also can never be sure who is able to access this information and when.”

Vendors must Instill trust

Rafal Los, senior security strategist at HP Software and noted cloud security expert, says that cloud-based data storage providers can increase trust in their services through continuous assurance measures such as active security monitoring, and by regularly issuing reports on the state and compliance with applicable regulations.

“Customers don't just want a stale compliance report, a dashboard showing you keep up on patches, or with months-old penetration testing results, they want to know that your environment is healthy and secure right now,” Los said.

“System security is so closely tied in with system health the two must be integrated, such as with the HP OpsAnalytics platform, which provides real-time analysis of performance telemetry and comprehensive log analysis into a single suite â€" bringing us closer to being able to determine the presence of real-world attacks where there are no known patterns to detect â€" or ‘finding the unknowns' as it is sometimes referred to,” Los continued.

Los says that security assurance means having more than just a compliance dashboard, it means understanding the comprehensive system status. To increase customer trust, vendors must go beyond merely claiming they are secure. They must prove they understand their dynamic environment, and that they can respond to deviations from normal operating patterns quickly to protect their customer's data and their service's integrity.

Customers must verify

Los advises organizations that are considering making the jump to the cloud to consider all the capabilities of a chosen provider, and determine whether their provider can give them real-time or near-real-time security assurances and compliance statuses.

“One key for customers moving databases to the cloud is not just having that sense of security, but also knowing that when security is tested it may likely fail, and it will fail because there is no absolute guarantee of security,” Los said.

He recommends that customers should avoid just looking for vendors offering “secure” services, but instead should seek out vendors who can demonstrate they can effectively and reliably detect problems, respond to them quickly, and restore services that are critical to the organization's business functions.

“The ability to detect anomalies through system performance telemetry, coupled with real-time comprehensive log analysis and advanced security components, gives your vendor the ability to detect, respond and restore your service faster if and when it fails or is tested. As a customer don't just go looking for vendors offering ‘secure,' ask for vendors who know how to detect, respond and restore critical services,” Los said.

About the author:
Anthony M. Freed is an information security journalist and editor. You can find him tweeting about security topics on Twitter @anthonymfreed.




Iranian Cert issues warning over fresh \'wiping\' malware

Malware that has the ability to ‘wipe' its actions has been detected in the Middle East.

According to research by AlienVault, the malware is a self-extracting RAR file with the name GrooveMonitor.exe that has code to delete files on different drives on specific dates. When the bat file is executed, the juboot.exe file is deleted as well as the GrooveMonitor.exe executable that resides in the start menu folder.

“The bat files checks the system date and if it matches one of the predefined dates, it executes the wiping routine. This routine checks for system drives and it then deletes every file on those drives. Finally, it deletes the user profile folder,” the company said.

Jaime Blasco, labs manager at AlienVault, said: “When the installer is executed, it adds a registry entry that ensures the malware's persistence across system reboots and creates a Windows batch file containing the data wiping routine.

Due its use of batch files - script files to be executed by the Windows shell program - the malware has been dubbed ‘Batchwiper'. It is not clear how the malware is being distributed. The dropper could be deployed using several vectors, ranging from spear phishing emails, infected USB drives, some other malware already running on computers, or an internal actor uploading it to network shares.

“For some reason several actors are using malware with wiping capabilities in the Middle East. I don't know the reason but we can also say that all of them - Shamoon, this new one, etc - are very simple and don't represent a serious threat. Nevertheless the malware can do a lot of damage if the wiping routines are executed.”

The Iranian computer emergency readiness team (Cert) has issued an advisory, which acknowledged research that the malware wipes files on different drives in various predefined times.

It said: “Despite its simplicity in design, the malware is efficient and can wipe disk partitions and user profile directories without being recognised by anti-virus software. However, it is not considered to be widely distributed.

“This targeted attack is simple in design and it is not similar to the other sophisticated targeted attacks.”

Earlier this year, Kaspersky Lab warned of the ‘Wiper' malware that was so well written that once it was activated, no data survived. Its forensic analysis of hard disk images that had been wiped found that the malicious program wiped the hard disks of the targeted systems and destroyed all data that could be used to identify the malware.

Tal Be'ery, web research team leader at Imperva, said that GrooveMonitor does not pose a real threat to companies as it only attacks local files and not databases or file shares.

“When all of your data gets wiped and your anti-virus proves to be worthless, do you take comfort in the fact the malware was simplistic? Indeed, this new malware raises the question â€" are these just singular incidents or do we witness a trend of malware designed to corrupt data rather than steal it? While all three malware attacks originated in Iran, a country of great interest for several espionage agencies around the world, only Wiper is believed to be state-sponsored,” he said.



Flaw detailed that allows access to popular Samsung devices

A vulnerability has been revealed to affect Samsung smartphones that could allow an attacker to gain administrative access to the devices through any application.

Posting on the XDA Developers forum, ‘Alephzain' published details about the flaw that described the security hole that lies within a Samsung headset kernel and affects all devices that run using the Exynos 4210 and 4412 processor.

Affected devices include the Samsung Galaxy Note 2, Galaxy S3, Galaxy S2, Meizu MX â€" and potentially other Samsung products.  

This would allow access to all physical memory on the device and in the worst-case scenario, it to be stolen or erased by an attacker who uses an app to exploit the flaw, according to Alephzain.

They said: “The good news is we can easily obtain root [access] on these devices, and the bad is there is no control over it.”

So far, the flaw doesn't appear to have been publicly exploited. On Monday, Joseph Hindy, another member of the developer forum, published additional details about the vulnerability.

Hindy said: “Essentially, this exploit can be used to root any device with the aforementioned processors. What's more, this method wouldn't require an Odin flash like most current root methods.

“However, this exploit could be dangerous. Not only could be used to acquire root access, but for malicious applications as well. So developers will have a fun time helping to fix the issues while using the exploit for root.”

A spokesman for Samsung told SC Magazine US that the company was "currently in the process of conducting an internal review"' on the issue.

Trend Micro technical communications expert Jonathan Leopando said: “It is possible that any device running an Exynos SoC and running newer versions of Android (Ice Cream Sandwich or later) could be at risk. Earlier versions of Android did not have the kernel device which was called in newer versions, so they are not at risk from this issue.

“As a practical matter, there are no good steps users can take to mitigate this threat. It is possible to download apps that disable access to system memory, but this also breaks key functions such as the phone's camera. It is up to Samsung to patch this threat permanently.”



Dell to acquire Credant to boost security portfolio

Credant is the latest security solution to be added to the product portfolio of Dell.

The software giant, who has acquired managed security service provider SecureWorks, data protection and identity management vendor Quest Software and next-generation firewall manufacturer SonicWall in the last few years, has now added the secure data technology to its enterprise computing portfolio.

Dell said that as well as adding data protection solutions to control, manage and secure data sent from endpoints to servers, storage and the cloud to its enterprise cloud computing portfolio, Credant's technology also supports multiple mobile operating systems. Financial details of the transaction were not disclosed

Jeff Clarke, president of end-user computing solutions at Dell, said: “The Credant assets will complement and extend current Dell device security features to make Dell Latitude, OptiPlex and Precision PCs some of the world's most secure.

“When combined with the change in computer behaviours and data in-flight, Dell can now offer a differentiated security proposition based on its own intellectual property.”

Bob Heard, chief executive officer and founder of Credant, said: “Protecting critical information has only become more important as organisations globally struggle to protect their data in an ever more complex world.

“This combination allows Credant to bring its deep capabilities in data security to Dell's robust solution set and customer base. Together we will continue to focus on innovation and building value that results in beneficial outcomes for our customers.”



The Best Time to Incorporate a Business

incorporate a businessHave you been thinking about starting a business or incorporating a business or an existing sole proprietorship?

If so, you might be wondering what's the best time to incorporate or form an LLC. Should you try to squeeze it in before the end of the year or wait until next year?

Below are three tips for determining when is the best time to incorporate your business:

If You Have Liability Concerns, Incorporate Right Away

If your business is involved in an industry or activities with a lot of liability, then you should incorporate or form an LLC as soon as possible in order to separate your personal finances from your business.

In this case, there's no reason to wait and expose yourself to anymore liability than you need to.

If You'll Gain Significant Tax Benefits From Incorporating, Do It ASAP

If your tax advisor has told you that you can significantly lower your taxes by incorporating, you will want to get your incorporation paperwork in as quickly as possible.

Of course, bear in mind that your corporation's ‘start date' is not retroactive. Any tax benefits you might receive from incorporating begin on the date you incorporate. This means you'll typically have to file two business income tax returns for the year:

  • First, for the months that you operated as a sole proprietor (or whatever your previous entity may have been).
  • Next, another tax filing for the months after you incorporated.

If You're Looking to Simplify Your Paperwork, Incorporate on January 1st

For small business owners that don't have significant liability concerns, January 1 is the most logical start date since it eases the paperwork burden. You can start fresh in the new year as a corporation or LLC.  Additionally, you don't have to worry about reporting taxes as two different entities during the year.

Because of this, January is the busiest time of the year for processing incorporation applications at many Secretary of State offices. In some cases, it can take up to 40-60 days to bring a Corporation or LLC into existence after you submit your filing documents with the state office.

If you're using a document filing service, you can also look into something called a “delayed filing” that lets you complete your paperwork now and then delay your actual incorporation date until next year. This lets you effectively choose the date of incorporation and your application will be fast tracked to the front of the line in January.

Takeaway

If you have a pressing need to incorporate or form an LLC (i.e. you have liability concerns or will get significant tax benefits), then you should form your business entity as soon as possible.

However, if there isn't a specific sense of urgency, look to incorporate in January and give your business a fresh start in the new year.

Benefits of Incorporating Photo via Shutterstock




Employers Say Wellness Programs Work

Are you worried about the rising cost of health insurance for yourself and your employees?

You're probably not alone, and concerns about cost may be one reason why nearly all (87 percent) of business executives nationwide believe workplace wellness programs are beneficial for their companies.

The study The State of Workplace Wellness in America, conducted by the Alliance for a Healthier Minnesota, polled business leaders nationwide and in six states to find out what they thought of workplace wellness programs and what challenges they faced in implementing them.

Three-fourths of respondents said community-based networks of business leaders would be useful resources to learn about workplace wellness initiatives and share information and ideas. Said Tom Mason, president of the organization, in announcing the results:

“Employers are realizing that wellness initiatives represent a solid business strategy with myriad benefits.”

What are the benefits of a wellness program?

Some 84 percent say such programs led to lower healthcare costs. Ninety-six percent say they help employees enjoy healthier lifestyles, 84 percent say they boost productivity, 78 percent say they lower absenteeism rates and 58 percent say they reduce workers' compensation claims.

More than half (55 percent) of employers in the survey already have workplace wellness programs in place. While improving employee health is the top goal (cited by 92 percent), reducing healthcare costs was the second most important goal (cited by 85 percent). The major health issues employers say their employees are struggling with are obesity (5 percent), stress (51 percent) and lack of exercise (51 percent).

Speaking of goals, even employers who had programs in place were struggling to measure ROI from the programs, with just 42 percent actually doing so.

Among those who hadn't implemented worksite wellness programs, cost (65 percent), concerns about getting enough participants (59 percent), and lack of time (54 percent) were the main reasons for not doing so.

Are you without a wellness plan?

I bet the reasons for not doing so cited above ring pretty true. Here are steps you can take to get past these obstacles and get a wellness initiative going:

Lead the Way

As the business owner, you need to commit to the importance of wellness in the workplace. Model the behavior you want to see by taking breaks, working out and eating healthy foods and snacks. A “do as I say, not as I do” approach won't work for wellness.

Designate a Leader

Put someone at your company in charge of leading the wellness plan implementation. Give them a budget and time frame to work with, and have them find out what employees are interested in, what your insurance offers and what's realistic.

Make it Relevant

The best wellness programs are customized to fit your company culture and employees' needs. If your company is staffed by 20-something beach Frisbee players, gym memberships or standing desks might be in order. If most of your team are 40-something moms, stress and weight loss might be their big issues.

Involve Your Insurance Company

Many health insurance plans now offer a wellness program or reduced rates on wellness options such as massage, yoga classes, gym memberships and more. Contact your insurance provider to see what's available to you. Even having someone come out to talk to your team about ways to improve wellness is a good way to encourage it




Instagram\'s New Terms Could Impact Your Business

Photo sharing app Instagram's new terms of use have a lot of users worried because of a new provision that states Instagram can sell photos to businesses or other third parties without permission from the user.

The terms state that shared photos can be used:

“. . .in connection with paid or sponsored content or promotions, without any compensation to you.”

Theoretically, this means that if you upload a photo of, say, your dog, Instagram could sell it to a pet food company for them to use in advertising materials. And this could be done without you ever being notified or compensated.

But just because Facebook, which completed its purchase of Instagram three months ago, can sell images to companies doesn't mean that it's necessarily setting up a stock photo service where advertisers can buy these images from Facebook without any money going to the people who actually took the photos.

More likely, the updated policy means that Instagram may intend to use your content as part of its own advertising or in conjunction with Facebook's advertising products.

So what does this mean for your business?

If you use Instagram for promotional purposes, then you shouldn't upload any content that you wouldn't want distributed to other companies for advertising or similar purposes.

However, Instagram already reserved some rights over shared photos under a “limited license,” and the new terms maintain that users still retain ownership of their images. But users that are worried about images being distributed within sponsored content on Instagram, Facebook, or other channels may want to explore other photo sharing options.

The new terms of use become effective January 16, 2013 and there is no way for users to opt out of the new provisions aside from deleting their accounts altogether before the January deadline.

There are several third party sites such as Instaport and Copygram that allow Instagram users to save all their photos from the site so that they can have access to them if they choose to delete their accounts.




5 Reasons To Consider Using Digital Pen and Paper To Boost Productivity

Earlier this year I reviewed Anoto's digital pen and paper technology, it's time to revisit that issue.

Paper is good â€" I'm not one of these techno beasts who put down business professionals who rely on paper. Often times, paper is just a better medium for reading and editing information.

The benefits of a digital pen and paper is that you get the best of both worlds. The digital pen means your back office can have accurate information, more easily capture into your computer systems and you have an automatic archive of what is being written. These benefits alone make it worth seriously looking into.

Joshua Greenbaum, is principal of Enterprise Applications Consulting and gives these five reasons why digital pen and paper technology might be best for your business:

  • User-Friendly. It is as easy to use as a regular pen and paper. Just replace the existing pen with a digital pen and familiar handwritten documents and forms can become part of a permanent, fully-digitized, record.
  • Collaborative. There are many instances where digital pen and paper technology is ideal. For example, a group of architects marking up a blueprint at a construction site, or a doctor taking a medical history without having a PC or tablet that might normally get in the way of the patient/doctor interaction.
  • Rugged. Many business processes require capturing information under less-than-ideal circumstances where a PC or tablet may not be the best solution. This may be in challenging environments, where extremes of heat and cold require gloves and other equipment that impede the use of keyboard and touch screens, but where a digital pen solution works very well.
  • Keeps Users “on Task.” The use of digital pen and paper technology places an intrinsic limit on what a user can do in the course of completing a specific task. A general purpose device such as a PC, tablet or phone, provides a potentially large number of distractions and diversions for users, who may be tempted to use the device for a purpose unrelated to the specific task or process at hand. The close link between the user and the digital pen means the only interaction a user can have with the device is dictated by what is on the piece of paper.
  • Easy to Integrate With Existing Business Processes. The ability of digital pen and paper technology to capture the pen strokes of a user and digitize them lends itself readily to the use of this technology inside an existing business process that is already dependent on the use of a paper-based form. Therefore, digital pen and paper technology can be used for pre-existing workflows and business processes, and can be integrated into the development of new business processes.


Should You Invest In Content For Tablet Users?

Android Windows TabletSo you KNOW that you need a web site. You KNOW that you need your online content designed for smartphones. You know that you need to develop social content, email newsletter and a blog. There is yet ONE MORE thing for you to CONSIDER.

Should you develop content just for tablet users? Based on a recent press release:

 Harry & David,provider of gourmet premium gifts, announced that they turned to Skava to create a fully tablet optimized website experience after the company saw that their tablet traffic had more than doubled in the last 12 months. 

The big lesson learned in this is that they WATCHED their analytics and discovered that they had enough customers and potential customers to warrant a dedicated focus on content just for tablet users!

A recent Skava report “The Significance of Tablet for Retailers Report 2012” shows that a tablet shopper spends more, is 4 times more likely to buy and is much more affluent than a smartphone shopper. The same report also shows that prior to Thanksgiving this year, only 7% of the top 100 US retailers have created a tablet optimized website â€" but Skava expect that to double by the end of 2012 as retailers finally understand the value of catering to tablet users.

Harry and David chose to create the new tablet website in order to:

  •          Optimize the Harry & David brand experience across platforms
  •          Better leverage unique capabilities and high resolution imagery of tablets
  •          Improve ease of navigation for tablet shoppers
  •          Create an engaging shopping experience for high value customer segment
  •          Increase conversion rates for tablet shoppers

 



Share Files and Outlook Folders From PC to PC: No Cloud Needed

I LOVE the “cloud”. Without online software my business would not be nearly as productive as it is. In fact, without the cloud there would be no Infusionsoft, no Facebook, no Google â€" there would not be a lot of the online services we use so much today.

However, sometimes you want to share a file or Outlook folder and you wonder, “if I share this file through an online service, is it really secure”.

CodeTwo Public Folders is Windows software that let's you share and synchronize files and Outlook folders directly, from computer to computer with no online cloud storage.

Pricing starts at $160 â€" no monthly fee and here are some features of CodeTwo

  • Create and share public or personal folders â€" Share personal Outlook folders or create and share public folders that work similarly to Microsoft Exchange Server.
  • Real-time, automatic syncing â€" No need to click.  Selected folders are automatically synchronized in real-time.
  • Work online or offline -- Since files are stored on local computers, users can work offline without an Internet connection.  All content changes are updated when users return online.
  • Sync Outlook custom forms and views  â€" Teams can synchronize custom Outlook forms and views to help increase efficiency and ensure everyone has the same workflow.
  • Administration Panel â€" Manage access rights, backups, licensing or restore removed items from the convenient admin panel.
  • Fast set up, easy to use â€" No need to learn new software. Set up in minutes on Windows PCs.  No servers or high-level technical expertise required.

 



Busiest Day for Submitting Expense Reports in U.S.

A great product or service may be the starting point for your business, but productivity and efficiency are critical for making it a success in the long run. Problems in workflow can cost money and can eventually sabotage your efforts. Here's how the most successful companies large and small can run into difficulties and how products and strategies aimed at improving productivity and efficiency can literally save a business, no matter what the size.

So Much to Do

So little time. Today is the busiest day of the year in U.S. businesses for submitting expense reports. It's an issue that could cost companies a potential $2 billion in waste, according to Concur, a provider of integrated travel and expense management tools. There are many ways proper management of workflow can help your business thrive. Aim for better productivity and watch profitability climb. Yahoo! Finance

A better way. Fortunately there are some great tips out there for getting through days like this in your business. Check out this guest post from Andrew Presti, general manager at Presti & Naegele, a New York-based accounting firm, who shares some great tips for getting your staff through this busy time of year. Share some examples below of how you help your team through the tough times. We'd love to hear! Concur.com

Like a Machine

Plans for productivity. The key to more efficiency and better productivity in a small to medium sized business or even for a part-time entrepreneur or solopreneur lies in creating a plan that will allow you to utilize your time and resources effectively. It is also important to have the discipline to follow that plan in day to day operations. Here productivity enthusiast and entrepreneur Timo Kiander interviews L.J. Earnest, owner of the Simple Productivity Blog, about her efforts as a part-time entrepreneur balancing her online business with a full-time job. Productive Superdad

Priority picks. While creating a plan to improve productivity is important, just as critical is the ability to prioritize tasks. Time is money, as the old saying goes, and it's important to conserve the time you need to operate your business effectively. That means saying “no” to some projects, explains small business owner Paul Cox. It all begins with understanding the value of your time. SpinLessPlates

Better Tech

Tools make the difference. As important as it is to improve the productivity of your employees, the right tools can also improve efficiency. One example is TurbineHQ, a software application that gets rid of excessive paperwork and gathers all the information needed to run your business into one place, making it easier to track. Imagine the increased productivity in your business if you eliminated paperwork. Check out Stephanie Watson's review to figure out whether this tool lives up to its reputation. GetApp Learning Center

Through a scanner brightly. Converting all that paperwork your business relies upon does not require special software, however. In fact, a simple scanner will do the trick. Ramon Ray gives us a video review of one of the easiest to use of these devices, showing you how to digitize all those important papers that hold crucial information imperative to your company's survival. Smallbiz Technology

How to Excel. You don't need to be high tech to improve your business efficiency. For example, even Microsoft Excel, perhaps a bit old-school to many high tech entrepreneurs, has excellent capabilities that help you look at your business's productivity and efficiency in a whole new way. The key is to bring the right expertise to each tool, says sales trainer Neal Shorney. Learn the ins and outs of all your tools so you can use them effectively to create the business you want to run. Tweak Your Business