Filter by
Blog
|
3 min read
Why Outsourced Onsite IT Support is Overrated
To be clear, we're specifically addressing out-sourced IT with the third-party engineers onsite.
Out-sourced onsite IT s...
Read More
Blog
|
4 min read
How Voice Technology Is an Alternative To Touching Your Keyboard
Did you know that your keyboard is filthy? Not your keyboard in particular, but everyone's? We touch our computer keyboa...
Read More
Blog
|
2 min read
Cyberattacks: A Matter of Life and Death
Last week the College of Nurses in Ontario was hit by a ransomware cyberattack that threatened to compromise personal da...
Read More
Blog
|
1 min read
Cybersecurity Alert - Emergency Windows Server Patch
Over the weekend, the Cybersecurity and Infrastructure Security Agency (CISA), a federal agency overseen by the Departme...
Read More
Blog
|
7 Min Read
Top 5 Places Businesses Should Use Multi-Factor Authentication
We break down the top 5 most common entry points for hackers – which is where multi-factor authentication should definit...
Read More
Blog
|
3 min read
What is Ransomware and How to Protect Against It
Its a specific type of cyberattack in which the attacker is not interested in capturing and stealing data to sell to ot...
Read More