Education Centre

Factsheet on Mobile Applications and Cybersecurity

Factsheet on Mobile Applications and Cybersecurity

FaceApp, the AI-powered photo editing app, went viral for quite a while until various experts expressed concerns about cybersecurity. In light of these concerns, we’ve put together a quick factsheet on mobile applications and cybersecurity. Here are a few tried and true ways to protect yourself: Download applications from trusted sources only and do your […]

read more
Google Docs Being Used to Attack Users With TrickBot Banking Trojan

Google Docs Being Used to Attack Users With TrickBot Banking Trojan

Watch Your Google Docs: Program Being Used to Disseminate TrickBot Malware Beware of any Google Doc emails you receive. Cyber attackers are using the word processing program for a phishing scam that disseminates TrickBot malware.   Take extra caution if you receive a Google Docs document sharing email in the near future — it may be […]

read more
Using Managed IT Services to Save You Money

Using Managed IT Services to Save You Money

How Using Managed IT Services Saves You Money in the Long Term Wondering how to make your business’ IT run better without costing more? One popular option to consider is managed IT services companies.  Digitization. Network. Security. Mobile. As the average business sees more and more complexity in their IT requirements, it can become harder […]

read more
Happy Labour Day

Happy Labour Day

To make the most out of what we hope will be a gorgeous long weekend, we will be closing our office for the day on Monday, September 2nd. And as always, we’ll have technicians on call for all of our managed IT services clients, and you’ll be able to reach us by calling our office […]

read more
10 Questions Every Company Should Ask Before Outsourcing IT Services

10 Questions Every Company Should Ask Before Outsourcing IT Services

Ten questions to ask while considering outsourcing your IT services to a provider.   Many companies are outsourcing their IT functions due to convenience and budgetary constraints. Small- and medium-size businesses can focus their hiring of staff for their core business, and hire an IT consultant for their expertise and efficiency. However, even with the […]

read more
Why is Effective Business Continuity Management Important?

Why is Effective Business Continuity Management Important?

Why is Effective Business Continuity Management Important? Business continuity management (BCM) denotes how organizations plan for and respond to risks. Mission-critical functions must continue to run after disruptions such as bad weather or hackers. A business continuity plan documents how your organization will continue to operate after a natural or man-made disaster, severe market conditions […]

read more
Capital One Data Breach

Capital One Data Breach

Recently, news broke about the latest large-scale data breach to hit a major organization. Capital One Bank has announced that millions of customers across the US and Canada have had their personal information compromised in one of the biggest breaches to ever happen to a financial services company. This brief video courtesy of News24 discusses the […]

read more
Cyber Security is Vital for Small Businesses

Cyber Security is Vital for Small Businesses

Small Business Tech Security Small businesses need to take cyber security seriously, preventing lapses or weak points that could lead to major data breaches or attacks.   Modern technology is rapidly changing the landscape for small businesses. Small companies can now do more and have a far greater reach, but they are also faced with […]

read more
How Do I Keep My Law Firm Secure?

How Do I Keep My Law Firm Secure?

Even though businesses all over the world are getting hit with these cyber attacks, people expect law firms to be better. They expect perfection from the legal world. So, how do you keep your law firm secure?

read more
The Complete Guide to Managing Popular Extensions Successfully

The Complete Guide to Managing Popular Extensions Successfully

Protect Yourself from Potential Attacks Via Chrome Extensions Learn two simple ways to set the privacy and activity settings for each Google Chrome extension on your browser and steps the company is taking to protect users. Google’s Chrome web browser is a popular choice for businesses the world over. Managing the extensions gives you more […]

read more

Search Our Tech Insights