receives compensation from some of the companies listed on this page. Advertising Disclosure
BDC Hamburger Icon


BDC Logo
Search Icon
Shannon Flynn profile picture

Shannon Flynn

Business Technology Writer
About Me

Shannon Flynn is a business technology expert who developed a passion for the subject after becoming a self-described “technology hoarder.” Over the years, she has immersed herself in the industry by studying everything from the technical processes involved in various devices to the jargon commonly used to discuss both IT and consumer tech.

Flynn frequently advises on the best cybersecurity strategies, the evolving cryptocurrency industry and the latest trends related to the Internet of Things (IoT). She also provides guidance on utilizing data and artificial intelligence to drive business efficiencies. In addition to serving as an editor for ReHack magazine, Flynn has contributed to Lifewire, Computer Weekly, Lifehacker and other technology-focused publications.

Contributing Writer at Lifewire
May 2022 - Present
Contributing Writer at ELECTRICAL CONTRACTOR Magazine
January 2022
Contributor at MUO
June 2021 - Present
Contributing Writer at HackerNoon
September 2020 - Present
Contributing Writer at VGR
July 2020 - Present
Shannon's Activity
What Is an Auto-Dialer? - thumbnail
What Is an Auto-Dialer?
Auto-dialing software has been around for some time, but it can be confusing to the average person. Here's how it can be a game-changer for businesses.
Updated April 10, 2024
What Is SIP Trunking? - thumbnail
What Is SIP Trunking?
A SIP trunk is the digital version of an analog phone line. Learn how you can upgrade to a unified digital phone system for your business.
Updated April 10, 2024
15 Successful Text Message Marketing Examples - thumbnail
15 Successful Text Message Marketing Examples
Text message marketing is a powerful tool for reaching your customers. See some SMS marketing examples and adapt them to your campaign.
Updated February 14, 2024
Cybersecurity and Risk Management - thumbnail
Cybersecurity and Risk Management
Cybersecurity risk management identifies data and network risks and how to defend against them. Learn best practices for cybersecurity risk management.
Updated January 04, 2024