Blog

  • How to Spot the Latest Ransomware Scam

    Posted by .

    Did you know that over 400,000 phishing web sites were detected in each month of 2016?  You read that right – 400,000 PER MONTH (thanks to Webroot for that sobering fact).  Also interesting is the fact that almost all of
    Read More
  • Adaptive Security Architecture

    Posted by .

    New Year, New Threats. As we all rush back from the holiday season and headlong into the influx of work, two things are certain: we are in a new year, and security threats are more numerous than ever. Our Help
    Read More
  • Best Practices for Avoiding Ransomware

    Posted by .

    Its no secret that the Holy Grail of malware is ransomware. Criminals are extorting incredible amounts of money from small and large businesses alike every single day. And if history is any sort of indicator, this will get a lot
    Read More
  • Demonstrating Value in Managed IT Services

    Posted by .

    “There is no value until the client perceives there is value” I have used this statement in at least one of my recent blogs. But it could just as easily be stated:” One man’s junk is another man’s treasure” (or
    Read More
  • IT Security and Our Right to Privacy

    Posted by .

    I found it interesting to see the RCMP are lobbying our lawmakers to pass a law compelling us to divulge the passwords of our mobile devices if by some chance they are confiscated as part of any ongoing investigations.  This
    Read More
  • Pondering a Move to the Cloud? 5 Things to Consider

    Posted by .

    I regularly get asked the question: “Should we move to the cloud?” Invariably, my answer is always an unfailing “Maybe” much to the enquirer’s chagrin. Problem is, it’s just too broad a question. It’s a little like asking “Should I
    Read More
  • IT Support and the Value Proposition

    Posted by .

      “THERE IS NO VALUE UNTIL THE CLIENT PERCEIVES THAT THERE IS VALUE” In other words, value is in the eye of the beholder. All too often providers of IT support tend to miss this point and as a result,
    Read More
  • Cloud Computing in Canada and the Impact of the US Patriot Act

    Posted by .

    Disclaimer!  The information here is presented as just that: information only.  I am not a lawyer and I get most of my info the same way you do – I Google it.  So don’t take my word as gospel, consult
    Read More
  • When a disaster hits, are you ready?

    Posted by .

    Ever wonder what will happen to your data when you are not watching? Do you have a plan set when an event of a catastrophic data loss occurs? Most small to medium size businesses don’t. According to the IBM 2015
    Read More
  • Spam Prevention – the 5 Best Ways to Stop It Dead In Its Tracks

    Posted by .

    Spam – no longer just a tasty, meaty treat <shudder>. I can’t decide which version of spam is more disgusting but I guess it depends upon the version of spam you are currently looking at. Still, someone must be hooking
    Read More