business.com receives compensation from some of the companies listed on this page. Advertising Disclosure
World's Best Boss

Do you have the world's best boss?Enter them to win two tickets to Sandals!

BDC Hamburger Icon

MENU

Close
BDC Logo
Search Icon
Shannon Flynn profile picture

Shannon Flynn

Business Technology Writer
Introduction
About Me

Shannon Flynn is a writer who has spent five years covering all things technology, including business technology tools and software, cybersecurity, IoT, cryptocurrency, and blockchain. She is the Managing Editor at ReHack and a contributor at MakeUseOf, LifeWire, and SiliconAngle.

Experience
Contributing Writer at Lifewire
May 2022 - Present
Contributing Writer at ELECTRICAL CONTRACTOR Magazine
January 2022
Contributor at MUO
June 2021 - Present
Contributing Writer at HackerNoon
September 2020 - Present
Contributing Writer at VGR
July 2020 - Present
Shannon's Activity
What Is an Auto-Dialer? - thumbnail
article
What Is an Auto-Dialer?
Auto-dialing software has been around for some time, but it can be confusing to the average person. Here's how it can be a game-changer for businesses.
Updated July 25, 2023
What Is SIP Trunking? - thumbnail
article
What Is SIP Trunking?
A SIP trunk is the digital version of an analog phone line. Learn how you can upgrade to a unified digital phone system for your business.
Updated February 01, 2024
What Is VoIP? - thumbnail
article
What Is VoIP?
VoIP technology uses a broadband internet connection to transmit phone calls. Learn VoIP's features and everything you need to know to implement VoIP.
Updated November 06, 2023
15 Successful Text Message Marketing Examples - thumbnail
article
15 Successful Text Message Marketing Examples
Text message marketing is a powerful tool for reaching your customers. See some SMS marketing examples and adapt them to your campaign.
Updated February 14, 2024
Cybersecurity and Risk Management - thumbnail
article
Cybersecurity and Risk Management
Cybersecurity risk management identifies data and network risks and how to defend against them. Learn best practices for cybersecurity risk management.
Updated January 04, 2024