Call us: 678.878.3376

Latest News

Latest News

What to Expect for the Economy in 2023

The end of 2022 is shaping up to be strong, with fourth quarter growth projected to be over 2%. Here's what the Chamber's Chief Economists Committee predicts for the economic outlook in 2023.

Read Article

How to know if your iPhone is listening to you

Find out how often your phone hears you and how you can limit it snooping

Read Article

Texas Republican proposes bill banning children under 18 from social media

The Texas bill would allow parents to request their children be removed from social media platforms

Read Article

How to check if your Instagram posts are being hidden

Instagram has launched a new tool to let you know if your posts are barred from being recommended to other users.

Read Article

'Alexa, Thank My Driver': Make Amazon Pay Your Delivery Driver an Extra $5 Tip

This simple Amazon Echo trick costs you nothing.

Read Article

Turn this Gmail security feature on ASAP

New Gmail encryption service will officially go live Jan. 20. When sending private emails, you want to make sure it's going to the right person, especially if that email contains your personal information.

Read Article

We’re in Denial About the True Cost of a Twitter Implosion

Elon Musk’s platform may be hell, but it’s also where huge amounts of reputational and social wealth are invested. All of that is in peril.

Read Article

DelPhi launches latest client site in construction

DelPhi is honored to release its latest website from within our family of happy clients. Barefoot at the Bay, a construction company located in Santa Rosa Beach, Florida, is now online!

Read Article

Five Years of Insights: What We've Learned from the Small Business Index

The MetLife and U.S. Chamber Small Business Index celebrates five years this quarter, Q2 2022. We take a look at its highs and lows, major trends, and what the future holds for small businesses.

Read Article

China accessed data of US TikTok users repeatedly, report says

TikTok's parent company is required to share data with the Chinese government

Read Article

Your kids’ apps are spying on them

Apple and Google just look the other way. Here’s how we stop it.

Read Article

Cybersecurity check: See if anyone is poking around your Gmail, Facebook or Netflix account

Think about just how much of your life is accessible by your online accounts

Read Article

Don’t Take Privacy on Venmo for Granted

A new study shows that more than 40 percent of users have shared sensitive information on the app.

Read Article

The 30 Best Gift Ideas for the New Grad in Your Life

Ring in their special milestone with useful gadgets, outdoor gear, subscriptions, and modern conveniences.

Read Article

‘Phones are like a scab we know we shouldn’t pick’: the truth about social media and anxiety

Although connecting with friends online has positive benefits for mental health, overdoing screen time can lead to a catastrophic emotional crash

Read Article

DelPhi Communications and the Georgia Association of Chamber of Commerce Executives renews partnership

In April, the Georgia Association of Chamber of Commerce Executives (GACCE) Board of Directors agreed to extend its partnership with DelPhi Communications, which will include the development of a fully redesigned website and additional Web features and capabilities to enhance GACCE operations online.

Tiffany Fulmer Ott, Executive Director of GACCE, states, “We are thrilled to continue our partnership with Brent and his team with DelPhi Communications.  We will be launching an updated website soon, and we’re proud to be working with DelPhi now and in the years to come.”

Further, DelPhi has renewed its Executive Partner Program that will provide financial assistance to those chambers of commerce who are current or new DelPhi clients, as well as active members of GACCE.  This partnership has now surpassed 12 years and continually strengthens as both DelPhi and GACCE work together to provide the best online services for its member chambers. “Call it building a legacy.  It’s been humbling for sure and I’m proud of our relationship with GACCE,” says Brent Seyler, CEO of DelPhi Communications.

For more information on DelPhi Communications and the Executive Partnership Program, CLICK HERE.

Read Article

Google will now let people remove phone numbers, addresses from search results

Google is expanding the types of personal information users can request be removed from searches, including phone numbers and email addresses.

Read Article

30-second privacy check every Google and Facebook user must do today

Facebook is notorious for collecting a ton of data. So much about you is collected, compiled, and sold to the highest bidder.

Read Article

U.S. Chamber Announces 2nd Annual Global Forum – Competition in the Global Marketplace

This year’s theme is “Competition in the Global Marketplace.” Businesses, governments, and citizens are wrestling with substantial shifts in the global landscape.

Read Article

DelPhi Launches New Restaurant Website

CITY EATS KITCHEN is a unique combination of classic cuisines and stylish bourbons both old and new from various American cities, music entertainment, contemporary restaurant design, and professional customer service all intended to seamlessly create a must-do dining experience.

Read Article

DelPhi to Participate in the GAHCC Small Biz U Cybersecurity Lunch & Learn

DelPhi CEO, Brent Seyler, will be a panelist for the Greater Austin Hispanic Chamber's Lunch & Learn webinar on Cybersecurity on March 29th, 2022 from 12:00 – 1:00 PM. The GAHCC Small Business University (Small Biz U) is an informative panel series that provides our community with the resources they need to build a stronger business.

 

Read Article

Georgia Chamber Advisory Regarding News of Probable Russian Cyber-attack

Atlanta, GA – Wednesday, March 23, 2022 – The Georgia Chamber Foundation as a service to its member investors looks to inform and increase business cybersecurity awareness in the days to come.

As the conflict in Ukraine has widened, the Biden administration is now cautioning companies to 'harden their defenses' about what they perceive as a probable cyber-attack on U.S. infrastructure.

Georgia businesses should immediately begin to audit their security protocols and utilize best practices to ensure the integrity of their own cybersecurity infrastructure. Here are the current recommendations:

Reduce the likelihood of a damaging cyber intrusion
  • Validate that all remote access to the organization's network and privileged or administrative access requires multi-factor authentication
  • Ensure that software is up to date, prioritizing updates that address known exploited vulnerabilities identified by CISA
  • Confirm that the organization's IT personnel have disabled all ports and protocols that are not essential for business purposes
  • If the organization is using cloud services, ensure that IT personnel have reviewed and implemented strong controls outlined in CISA's guidance
  • Sign up for CISA's free cyber hygiene services, including vulnerability scanning, to help reduce exposure to threats
Take steps to quickly detect a potential intrusion
  • Ensure that cybersecurity/IT personnel are focused on identifying and quickly assessing any unexpected or unusual network behavior. Enable logging in order to better investigate issues or events.
  • Confirm that the organization's entire network is protected by antivirus/anti-malware software and that signatures in these tools are updated.
  • If working with Ukrainian organizations, take extra care to monitor, inspect, and isolate traffic from those organizations; closely review access controls for that traffic.
Ensure that the organization is prepared to respond if an intrusion occurs
  • Designate a crisis-response team with main points of contact for a suspected cybersecurity incident and roles/responsibilities within the organization, including technology, communications, legal and business continuity.
  • Assure availability of key personnel; identify means to provide surge support for responding to an incident.
  • Conduct a tabletop exercise to ensure that all participants understand their roles during an incident.
Maximize the organization's resilience to a destructive cyber incident
  • Test backup procedures to ensure that critical data can be rapidly restored if the organization is impacted by ransomware or a destructive cyberattack; ensure that backups are isolated from network connections.
  • If using industrial control systems or operational technology, conduct a test of manual controls to ensure that critical functions remain operable if the organization's network is unavailable or untrusted.
If your business is experiencing suspicious and unusual activity, please report such activity to the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, or your local law enforcement agency.
###
About The Georgia Chamber of Commerce
As the state's largest business advocacy organization, the Georgia Chamber of Commerce represents investors in every county of our state with a diverse cross-section of over 500 industry sectors. Our number one mission is keeping, growing and creating jobs to make Georgia a better state for business. We work to ensure economic competitiveness, innovative solutions to challenges that our state faces, and a commitment to high quality of life. More information at gachamber.com.

MEDIA CONTACT: 
TJ Filipowicz—Vice President, External Affairs
tfilipowicz@gachamber.com
404.223.2493 (office)

Read Article

A few tips to help keep you and your information safer

William Shakespeare once wrote, “The eyes are the window to your soul.” If that’s true, then I’d say technology is definitely a window (and door) to everything else.

With all of the recent cyberattacks, continuously stolen customer data, the latest TikTok® revelations, Log4j, cyberthreats from Russia and China, and a host of other alarming issues, I felt it necessary to share some important information to at least try to keep you safer than if you simply did nothing to protect your identity.  I also share this information because I recently had a couple of disturbing discussions with clients that left me baffled to say the least.  The first discussion was with a CEO of a small business who didn’t know where her emails were hosted and had no idea how to login to the host account.  The other discussion was with a client who didn’t know where the company's Domain was registered and the login credentials were nowhere to be found.

That said, I thought this would be the perfect time to share some things you can do to keep yourself, your family, and your business safer.  Maybe start with just a couple and go from there....

1)  COLLECT AND STORE YOUR INFORMATION

Collect and store all of your accounts, including account #’s, usernames, passwords, pins, and URL’s.  Make an additional copy and store it on an external drive, like a thumb drive, and place it somewhere safe and secure.  If you own a business or in a management or operations position, include the proper steps for retrieving or relinquishing important account information within your company Emergency Preparedness Checklist.

2)  TAKE THE EXTRA STEP TO LOGIN

Enable 2-step authentications whenever available.

3)  CHANGE YOUR PASSWORDS

Change your passwords regularly.  The rule-of-thumb for changing passwords is every 3 - 4 months.  Be sure to pay attention to strength meters and use various character types.  Also, do not to use the same password for every account.  Don't forget to update and verify your contact information for successful retrieval of your usernames and passwords as well.

4)  KEEP BROWSERS CLEAN

Clear your browser’s history often and do not “allow” your browser to save any of your passwords.

5)  KEEP YOUR DEBIT CARD OFFLINE

Do not store debit card information and only use credit cards for online transactions.  Also, be sure to sign out (log out) of an account once you’re done handling your business.

6)  CONSIDER A VPN

If you frequent the internet, consider subscribing to and using a Virtual Private Network (VPN) to make it more difficult to track your activities and steal your data.

7)  UNDERSTAND COOKIES BEFORE YOU "ACCEPT" THEM

A cookie is a small piece of text (code) sent to your browser by the websites you visit and helps those sites remember information about you, what you viewed, clicked on, etc.  Also, just an FYI, cookies do occupy space on your computer.  If there are enough of them stored over a long period of time, they could slow down your speed.

8)  DELETE TIKTOK®

Delete your TikTok® account.  Period.  While most marketing companies state the major trend in 2022 is that TikTok® will dominate Social Media, it’s because they’re capitalizing on another revenue stream.  They really don't care about your data.  If they did, they wouldn't push TikTok®.  It amazes me how many Americans are fine with using an app from China and freely handing them all the data they want and need.  TikTok® captures facial and voice patterns and it was recently released that there are 13 untrackable third-party connections to the app that are capturing and sharing your data.

References:

https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/ 

https://www.foxbusiness.com/technology/tiktok-personal-data-study

9)  STOP RESPONDING TO QUESTIONS

Stop answering those random questions you see posted on Social Media unless you personally know the individual.  It's for the purpose of obtaining possible answers to those "secret questions" in order to gain access to accounts.

10)  CONTROL YOUR CLICKS

Stop arbitrarily opening emails that seem suspicious.  Just delete them and don't think twice about it.  Remember, curiousity killed the cat and it could kill your data too.

 

If you have any questions or need any assistance, please do not hesitate to contact us.  Our clients will tell you that we go "above and beyond the call" and we'll be more than happy to help you as well.

Read Article

Trump Launches Social Media App: Everything You Need to Know

Truth Social tops Apple's App Store despite a buggy rollout.

Read Article

Hackers Use Office Equipment to Scam Employees

Employees are most vulnerable to cyberattacks via cloud-connected office equipment, according to a new report from Netskope, a software company providing computer security.

Read Article