Blog / Reports / Resources
Everything You Should Know about the OneLogin Data Bleach
This is an article about the recent hack of the popular password manager OneLogin. We will briefly examine the impact this might have had on its users. In a blog post, the chief security officer of OneLogin Mr. Alvaro Hoyos said that they were aware of unauthorized...
How Will the True Essence of Digital Transformation Impact Your Company?
Digital transformation – is your business ready? Do you have a solid grasp of the true essence of the process? If not, it’s not too late – learn more here: Digital transformation, disruption, and digitization. It can seem as though anywhere you look...
Humans And AI Improve Business And Quality Of Life Together
The future has arrived where AI and human beings partner to improve business and quality of life. Two of the themes Sci-Fi movie fans have always loved about the genre are “artificial intelligence” and “the future.” On the friendly side, the Stars Wars franchise...
Is your Smart Home Technology Putting you at Risk?
They are convenient, help you save time, energy and money, but smart home devices could pose a security risk for the unaware. Here’s what to know before you opt for smart home technology. Smart home technology is designed to help your home run more efficiently...
Step by Step Guidelines for Handling a Cyberattack at a Medical Facility
The four most important things a medical institution needs to do in the event of a hacking Unfortunately, cyber attacks on healthcare facilities are all too common. Such attacks grew by an astounding 63% in the last year and will most likely continue to grow as...
How Technology Has Transformed Canada 150 Years since its Inception
July 1, 2017 will mark 150 years since Confederation in Canada. Since that time, a lot has happened, especially in regards to the business environment. Today, it is undoubtedly much easier to do business than it was 150 years ago, thanks in part to technology. I would...
Amazon’s New Deal Will Change Your Food Buying Experience Forever
Amazon has decided to dabble into the grocery industry with its purchase of Whole Foods. For those in the groceries business, Amazon is about to become your biggest worry. Amazon.com recently purchased Whole Foods in a deal worth $13.7 billion. This has essentially...
It’s Time To Break Up With Break/Fix
Are you wasting money with Break/Fix IT services, like so many other businesses today? There’s a better way: Managed Services. Having the right tech is no longer a choice when it comes to running a business. Up-to-date hardware, software, and security solutions are...
Understand the GDPR Compliance Requirements
GDPR regulations for Europe go into effect very soon, but is your organization ready for the rigor required by these standards? Recent cyber attacks have technology leaders throughout the world reviewing their security requirements, but the European Union is already a...
What Companies Need to Know About Technology Management
Technology Management has become an important aspect of doing business today. Here are a few details about what it entails, and why a business may need it. Technology management is a term that is used to refer to a group of services offered to a business that may...
The Pros and Cons of Cloud Computing
Cloud Computing holds many promises for big and small businesses. Here are the advantages and disadvantages of adopting cloud computing. Today, the internet is one of the biggest drivers of growth for most businesses. It allows them to advertise their services for a...
Windows 10 Finally Creates a Solution for Ransomware
Windows recently revealed that their latest version of Widows 10 is immune to ransomware. They also made updates to earlier versions of their OS to protect them. When the WannaCry Ransomware hit a while back, Microsoft took an unusual step of patching all its old...
Security Risks of Using Public Wi-Fi
Public Wi-Fi can be quite dangerous. Here is a detailed list of the most common risks of using it and how to mitigate them. June is the Official National Candy Month. Thus, it is only fitting that we spend some time talking about the sweet things in life. For...
How Will Proposed Trump Budget Cuts Affect Healthcare Data Privacy And Security?
The Trump administration’s proposed budget cuts could directly impact the government’s ability to protect healthcare data privacy and security. The Trump administration has actively criticized Obamacare, stating that healthcare reform is needed within the...
Held Hostage: Properly Handling Ransomware Attacks
Unless you happen to be a cyber criminal, ransomware is bad news. So for the rest of us who might have a run in with a cyber criminal who uses ransomware as a method for extortion, it’s important to know what to do and how to handle such situations. Thankfully,...
Are Voice Message Notification Emails The Latest Ransomware Delivery Vessel?
Ransomware attacks are now being delivered via voice message notification emails to unsuspecting victims. A June 2016 Federal Bureau of Investigation (FBI) report revealed that an average of 4,000 ransomware attacks occurred per day in 2016. During 2017, the number of...
Improving healthcare EHR cybersecurity with IT
Cyber attacks against healthcare organizations are on the rise: this white paper offers proven ways to protect your organization and patients from ransomware attacks and other types of data theft. Introduction As healthcare becomes more patient-driven, with greater...
Microsoft’s Advice on How Business IT Professionals Can Disable SMB 1 Insecurities
This white paper details what additional steps IT pros need to take to safeguard their networks and systems and why they should leave the newer versions of SMBs alone. With the recent appearance of the “WannaCry” ransomware cyber attacks, the vulnerability of the...
Cyber Security is Front and Center As Connected Cars Become More Commonplace
With more vehicles with connected features on the roads every day, cyber security has never been more important to drivers. Learn how to protect your connected car from hackers and other criminals in the digital age. It’s no secret that cars are becoming...
The Top 10 Advantages to Working with an External IT Service Company
An external IT services company may be exactly what small and growing businesses need: Here’s why. Partnering with an external IT services companies brings plenty of benefits, especially for small and mid-sized companies that are grappling with the data...
Google’s Chrome Set to Introduce Ad Blocker in 2018
In an effort to reduce the intrusive and annoying nature of such ads, Google has announced that their new browser version will feature an automatic ad blocker. Consider the vast amounts of information, communication, and entertainment, which is funneled through the...
This Malware Downloader Can Infect Your PC Without Even a Single Click
A discussion of a particularly nasty strain of malware downloader and what you need to know to keep yourself, your business and your employees protected. Conventional wisdom tells us that if you’re trying to keep your employees, your clients and ultimately...
What Microsoft’s OneDrive and SharePoint Summer Updates Mean
Technology is an essential part of the modern business in large part due to the way that it helps bring people together. Since the beginning, Microsoft solutions like OneDrive and SharePoint have been founded on this simple fact – by making it easier for people to...
Celebrate Being a Geek!
June 13th is the Day to Celebrate Being a Geek! When you hear the word “geek” what image does your brain conjure up? If you’re like some people, this might be a bespectacled young man who uses his razor-sharp mind to write binary code for those nifty...
Driverless Cars– Utopian Dream or Dystopian Nightmare?
For many people, the vision of a world of driverless cars represents a commuter’s utopia, and for good reason. Commuting is costly, not only in terms of time and money but in terms of stress-related illnesses. Despite the fact that people have adapted to hurtling...
Phishing and Spear Phishing Scams
Don’t Get Caught in Their Nets. What is Phishing? Phishing is tech language for fishing over the Internet for confidential business and personal information such as credit card numbers, personal identification, usernames, and passwords. The first phishing scam...
Happy Superman Day Everyone!
Superman Day Is a Perfect Time To Start Your Journey To Becoming Your Own Information Technology Superhero You don’t have to rely on an outside savior to fix your IT emergencies. Prepare your organization for contingencies with these helpful IT security tips....
Yammer Now Supports More Content Than Ever: Here’s What the Social App Can Do
Yammer’s social capabilities now support a number of content formats: Here’s why that matters for your business. Yammer has gone through some important changes in 2017 as Microsoft has been working to make the social app as business friendly as possible....
Superman Day Is The Perfect Time To Start Your Journey To Becoming Your Own Information Technology Superhero
You don’t have to rely on an outside savior to fix your IT emergencies. Prepare your organization for contingencies with these helpful IT security tips. Duck into a phone booth (if you can find one!) and don your cape because Monday, June 12, 2017 has been...
13 Tips for Keeping Your Computer in Tip-Top Shape
Let’s examine some of the most likely computer issues and quick tips for combatting these problems. I sure do love it when my computer bogs down and slows my workflow, so I can’t meet my deadlines… said no one ever. I mean, honestly, is there a time when we’re...
6 Ways that AI Systems Can Help Your Business Make More Money
AI does more than just help with security: Here’s how it can make you more revenue too! Artificial intelligence still seems a little…unreal, doesn’t it? Yet you would be hard-pressed to find a company that doesn’t use some form of AI or...
Don’t Be A Victim Of Fake Malware Protection Apps On The Google Play Store
Don’t be fooled by the fake apps popping up on the Google Play store that falsely claim to protect you from ransomware. Recently, many Android device users were confronted with a barrage of fake apps in the Google Play store that claimed to protect against the...
How Much Should Your Business Be Spending on Digital Upgrades This Year?
Take a look at how companies are shaping their IT budgets, and what their biggest expenses are. A very common question among businesses is, “How much should I be spending on digital services?” or “Should we increase our IT budget this year?”...
The Queen’s Two Birthdays, British Weather, and Why This Actually Matters to When Updating Data Security
Here’s why you should never wait for security updates – oh and a bit about the Queen’s birthday! As followers of British royalty doubtless already know, Queen Elizabeth II recently celebrated her 91st birthday – sort of. You see, because of the way...
Your WannaCry Response Guide: Quick Fixes For Malware Scares
While you’re working out your long-term data security plans, here are the steps to take in the meantime. There are three general responses to a data attack like WannaCry. The first is the immediate, “What do we do to stop this and resume operations...
The Hard Facts About Cyber Insurance
Cyber insurance helps ensure business profits in case of data attacks: Here’s what you need to know. Cyber insurance is business insurance that covers costs associated with data attacks, offered by insurers and via plans with certain vendors. When many companies...
Microsoft’s Latest Updates For The Surface Pro Enhance Compatibility With Office 365
Learn about some of the much anticipated new features Microsoft recently announced for the Surface Pro and Office 365. Microsoft Office 365 and the Surface Pro tablet have been innovative products since their introduction, but the past month brought the announcement...
Five Sweet Moments in Tech History
Marshmallow operating systems, candy-colored computers, and other sweet innovations for national candy month. June is national candy month, and to celebrate, we’ve decided to share some of the sweetest moments in candy-related IT history. Each of these cultural...
Happy World Environment Day Everyone
Undeniable Link Between Strategic Tech Implementation and Sustainable Business Practices Now more than ever, business professionals in every industry are looking for the most sustainable and cost-efficient ways to reduce their environmental impact and drive...
Top Reasons Small Businesses Need to Guard Against Cyberattacks
Small businesses are particularly at danger of data attacks: Here’s Why There’s a common and flawed line of thinking among many small companies that goes something like, “Hackers only target large companies that have lots of customer information and...