Small Business Software Blog

Software Disclosure Requirements: CCPA and GDPR

Software Disclosure Requirements: CCPA and GDPR

Most small businesses were not too concerned with GDPR and compliance, as they were not doing business within Europe. However, California brought the data compliance game straight to the US. So, what will that mean for you and your business software?

Creating Your Company's Technology Strategy

Creating Your Company's Technology Strategy

One of the biggest mistakes we see is small businesses going forward without a good technology strategy. Developing your company’s technology strategy needs to be part of your overall business strategy. Find out how to avoid obstacles and vulnerabilities.

SaaS Security Best Practices For Small Business

SaaS Security Best Practices For Small Business

Securing data that resides in the cloud can be confusing, as there are myths around both sides of SaaS security -- that it’s more or less secure than software run on company servers. So, what are some SaaS security best practices for small businesses?

Cyber Resilience: Cybersecurity In Software Development

Cyber Resilience: Cybersecurity In Software Development

Cybersecurity in software development is vital to your business's cyber resilience plan. And it’s something that Sol Minion has made part of each custom software solution we develop and have been doing so for 20 years. Can you imagine investing in custom software then discovering it left your business vulnerable?

Why Is Cybersecurity Important?

Why Is Cybersecurity Important?

Many small businesses see cybersecurity as a big business issue. Yet, they have locks on their doors, their money in banks, and passwords on the WiFi. Adding basic cybersecurity can be nearly as simple and save the business from devastating consequences. So, let’s dig a little deeper.

Do Small Businesses Need Cyber Security?

Do Small Businesses Need Cyber Security?

Small business owners set themselves up for unnecessary risks when they buy into these myths. The facts are that hackers do target small businesses and that software and IT staff can’t do enough to protect your business and your customers.

The Software Development Process: What Don't I Know?

The Software Development Process: What Don't I Know?

As we walk clients through key considerations for a project, they recognize that we have the experience to manage a project from beginning to end, covering all the bases as we go. So, what goes into a project that you’ll need to consider?

Cybersecurity: Keep Employees from Getting Phished

Cybersecurity: Keep Employees from Getting Phished

How many of your employees are unaware of and unprepared for a phishing attack? By clicking a link or opening the wrong attachment, an employee can open your business up to hackers and potentially devastating consequences.

How To Align Business Objectives and Your Custom Software

How To Align Business Objectives and Your Custom Software

When your software fails to align with your business objectives, it quickly becomes a burden on your team. Business software needs to empower your whole team and help your business achieve its objectives. How do you align your business objectives and your custom software?

How To Know If You're Already Under Cyber Attack

How To Know If You're Already Under Cyber Attack

If your business is one that wants to be ready to fend off an attack and react to an ongoing attack, then it’s important to know if you’re already under cyber attack. Here are the key signs, along with our recommendations on how to react.

Software Consultancy: 20 Years of Lessons Learned

Software Consultancy: 20 Years of Lessons Learned

You learn a lot of important lessons when you do something for twenty years. The good news is, our clients are the ones who get to benefit from these lessons. So, what have we learned, and how can you benefit from this?

7 Cybersecurity Questions CEOs Need To Ask Their Teams

7 Cybersecurity Questions CEOs Need To Ask Their Teams

Cybersecurity is no joke, and every small business CEO needs to make sure their team is on top of it, ready to defend and react to protect company and customer data.