Blog / Reports / Resources

How To Protect Your Child From Identity Theft

How To Protect Your Child From Identity Theft

Depending on the age(s) of your child (ren), your response to this topic may be, “She’s too young – she doesn’t even have an identity yet.” Alas, not so. In our electronic society, kids exist in databases even before they’re born. And they are an attractive target for...

read more
Should You Ban Laptops From Meetings?

Should You Ban Laptops From Meetings?

Efficiency in the workplace is paramount to success. This concept is widely held across office environments everywhere. But while technology plays an increasingly valuable role in the way the world does business, that’s not to say it doesn’t come with its own unique...

read more
Do You Have Good Computer Habits?

Do You Have Good Computer Habits?

We know it’s important to have good habits in many parts of our lives, from our work to our daily hygiene. However, quite a few of us forget that we need to have good computer habits, too. Developing wise practices in connection with our computers and smartphones can...

read more
What Is HIPAA, And Why Should I Worry About It?

What Is HIPAA, And Why Should I Worry About It?

The Health Insurance Portability and Accountability Act (HIPAA) is a Federal statute, and associated regulations, that, among other things, control what healthcare providers and other “covered entities” do with “protected health information” (PHI). The HIPAA...

read more
8 Foolish IT Security Mistakes Never Get Caught Doing

8 Foolish IT Security Mistakes Never Get Caught Doing

Everyone makes foolish mistakes. You’ve done, I’ve done it, and it’s all part of being human. But if that mistake affected your IT security, consider the ramifications it could have on your organization for being careless. For instance, a computer hacked or leak of...

read more
PSA Alert! Sleeping While Phone Charges

PSA Alert! Sleeping While Phone Charges

Read the following alert before charging your phone tonight and from this day forward. According to the Newton, New Hampshire, fire department’s PSA message posted on social media; it seems as though charging a phone in bed poses a serious health risk and lethal...

read more
US Weapon’s Systems: Weak to Cyberattacks?

US Weapon’s Systems: Weak to Cyberattacks?

A recent report has revealed that there are many US weapons systems that are susceptible to hackers. This news is disturbing on many levels, including the attitude exhibited by Department of Defense officials. What does the report reveal, and how serious is the...

read more
Is Your Organization Ready to Comply with PIPEDA?

Is Your Organization Ready to Comply with PIPEDA?

On November 1, updates to the Personal Information Protection and Electronic Documents Act (PIPEDA) will be in effect. Included in these updates are rules involving mandatory notification of Office of the Privacy Commissioner of Canada (and affected individuals) if...

read more
Happy Spreadsheet Day!!!

Happy Spreadsheet Day!!!

What Are You Doing for Spreadsheet Day? Spreadsheets: some people love them, some people hate them, and some people are a little afraid of them. No matter which category you may currently fall into, you probably know that spreadsheets are vital to the inner workings...

read more
Infections That Can Survive The Most Extreme Cleaning 

Infections That Can Survive The Most Extreme Cleaning 

Technology has unlocked a world of potential for businesses everywhere. But with these advances comes a new set of problems, like malware. While it’s common knowledge that computers are susceptible to viruses, today’s breed of hackers are more creative than ever....

read more
Did Microsoft Just Win the Internet?

Did Microsoft Just Win the Internet?

Good news for people wanting a new Microsoft Surface Pro 6 2-in-1. It is all grown up. No longer just for schools, video-games, and weekend play, the new Surface Pro is ready for prime-time. It has a sleek new look and a thicker, black non-slip coating on the...

read more
October 16th Is Steve Jobs Day

October 16th Is Steve Jobs Day

Steve Jobs Day Sheds Light On Apple Founder’s Legacy In today’s modern world, the name “Apple” has become synonymous with technology. It’s no wonder then that Steve Jobs, the company’s late co-founder, has become such an influential figure in American history. His...

read more
Does Power BI Make Sense For Your Business?

Does Power BI Make Sense For Your Business?

If you could draw insights from your data within five minutes flat, would that get your attention? Microsoft’s Power BI is an online service, with a connection to other Software-as-a-Service (SaaS) applications, that lets you analyze, visualize and transform data...

read more
What Are The New Changes in Microsoft Outlook?

What Are The New Changes in Microsoft Outlook?

New Calendar, Mail, and mobile Outlook features help you get things done, was the title of the April 30th, 2018 blog from Microsoft’s Outlook team, about the newest features. Since then, Outlook has received more modern additions, from mobile management to enterprise...

read more

Apple iOS 12: Top Features You Need to Know About

Apple iOS 12 has so many different new features available it’s almost overwhelming. From better password management options to the introduction of the Memoji, users will appreciate some of these more than others. This article will highlight some of the most...

read more
6 Reasons Why Companies Are Moving Away from BYOD

6 Reasons Why Companies Are Moving Away from BYOD

Last year, Markets and Markets Research released a report that revealed that 50% of companies were considering the use of BYOD (bring your own device) policies. IT departments were tasked with developing a policy that allowed employees to use their personal devices...

read more
Digital Transformation: Is Your Business Ready?

Digital Transformation: Is Your Business Ready?

“Digital transformation” is a term likely circulating around IT departments everywhere. The vast majority of businesses today, no matter how big or small, will likely need to further digitalize their operations in order to keep up with competitive markets and an...

read more
How To Ensure A Secure Home Network

How To Ensure A Secure Home Network

Most homeowners and renters understand the importance of home security. In fact, in today’s world, it’s not uncommon for homeowners to spend hundreds or even thousands of dollars on home protection. But while securing your belongings is considered good common sense,...

read more
Implementing Data Security For Your Small Business

Implementing Data Security For Your Small Business

Today’s small business owners are tasked with managing operations, employees and a wide range of things pertaining to the modern day business. It’s no surprise, then, that amid the hustle and bustle, some areas of importance are thrown to the wayside. Cybersecurity is...

read more
Wi-Fi On Planes – Who’s The Best?

Wi-Fi On Planes – Who’s The Best?

If you are old enough, you may remember when making phone calls from an airplane was an expensive luxury, with sound quality so bad that conversations at times were impossible. Times have changed. Calls from planes are usually clear and carried over satellite...

read more
October’s Featured Training: The ABCs Of Cyber Security

October’s Featured Training: The ABCs Of Cyber Security

October Is Cyber Security Awareness Month Tune In At Any Time To Watch Our 15 Minute On-Demand Training Cyber Criminals Have A 6th Month Head Start. Is Your Business Protected? Find Out. Tune Into Our October Free Online Training By Clicking Here. Every 39 seconds, a...

read more
Google Shutting Down Google+

Google Shutting Down Google+

Google+ Social Media App Will Soon Move Off Into The Sunset Google+ has never really been a popular social media network. In fact, most people say they’ve never used it and don’t know how it works. So it’s not too surprising to hear that Google has finally decided to...

read more
What You Need to Know About Secure Messaging Apps

What You Need to Know About Secure Messaging Apps

You probably use messaging for communications every day, but how secure are your messages? Messaging apps are as susceptible to hackers as any other type of electronic communication, and if you are concerned about privacy then it’s time to learn the basics about...

read more
Happy Thanksgiving Everyone!

Happy Thanksgiving Everyone!

Happy Thanksgiving From Our Team To Yours! Why Not Show Your Thanks By Helping Another Business Use Technology To Succeed? As the days get shorter, and the nights get cozier, Canadians across the nation turn our minds to gratitude. It’s a season where we take a...

read more
Scalable Wi-Fi Is Best Practice For Schools

Scalable Wi-Fi Is Best Practice For Schools

Everyone has Wi-Fi. We all expect to see it wherever we go, and most of us have more than one Wi-Fi-enabled device. Grocery stores, fast food restaurants – even your mechanic has Wi-Fi. But does that mean you REALLY need it in your school? Isn’t it less secure...

read more
What’s Inside Health IT?

What’s Inside Health IT?

Health information technology is more talked about than really understood. Part of the reason for this is that providers and their staffs usually interact with a restricted subset of health IT – the Electronic Health Record (EHR), the radiology imaging system, the...

read more
Facebook Data Breach

Facebook Data Breach

Are you aware of a potentially serious data breach involving Facebook?  According to many top news outlets, 50 million users accounts may have been impacted and Facebook now faces potential huge fines in the EU. Read more...

read more