Filter by
Blog
|
3 min read
Four Reasons You Need Data Backups
Data loss can happen at any time and you don't want to be caught unprepared. Thankfully, many organizations today recogn...
Read More
Blog
|
3 min read
Why Outsourced Onsite IT Support is Overrated
To be clear, we're specifically addressing out-sourced IT with the third-party engineers onsite.
Out-sourced onsite IT s...
Read More
Blog
|
4 min read
How Voice Technology Is an Alternative To Touching Your Keyboard
Did you know that your keyboard is filthy? Not your keyboard in particular, but everyone's? We touch our computer keyboa...
Read More
Blog
|
2 min read
Cyberattacks: A Matter of Life and Death
Last week the College of Nurses in Ontario was hit by a ransomware cyberattack that threatened to compromise personal da...
Read More
Blog
|
1 min read
Cybersecurity Alert - Emergency Windows Server Patch
Over the weekend, the Cybersecurity and Infrastructure Security Agency (CISA), a federal agency overseen by the Departme...
Read More
Blog
|
7 Min Read
Top 5 Places Businesses Should Use Multi-Factor Authentication
We break down the top 5 most common entry points for hackers – which is where multi-factor authentication should definit...
Read More