3 Things for Effective Cybersecurity
You need three things for effective cybersecurity. Are you doing them? You saw the headline, and you’re thinking to yourself, just three things? Is this… Read More »3 Things for Effective Cybersecurity
You need three things for effective cybersecurity. Are you doing them? You saw the headline, and you’re thinking to yourself, just three things? Is this… Read More »3 Things for Effective Cybersecurity
Are you putting your systems at risk by running a unsupported version of Windows 10? Did you even know that was a risk?
Many recent articles regarding Windows 11 CPU support requirements, specifically that only 8th Generation Intel Processors and newer and AMD processors from a similar time… Read More »Limited Windows 11 CPU support might stop you from upgrading, and that’s a good thing!
Communication has always been the most crucial thing in building the foundation of trust in your business. In business, one of the most common forms… Read More »Secrets behind DMARC, DKIM & SPF and how they support BIMI and what is MTA-STS for?
In keeping with best practices the majority of our clients are using Microsoft Security Defaults, this requires registering for Microsoft Authenticator app in order to… Read More »How to Activate your Microsoft Authenticator
As a trusted partner, Nuance Communications, Inc. (“Nuance”) continuously advances technology to address customer needs and improve performance. Dragon Medical One, our flagship cloud-based speech… Read More »Dragon Medical Practice Edition DMPE is Discontinued!
Cloud is an important part of our lives, but remember, it’s just someone else computer. This means there are risks associated with storing data in the cloud, check out some tips to keep your data secure.
Regulations like PHPA, PIPEDA help define what must be done but they don’t help you understand how. Using the NIST CSF can help you bridge the gab between compliance requirements and evidence of compliance.
Many businesses in the front lines who are wearing medical masks suffer the same issue, prolonged waring of the masks irritates the ears. One of… Read More »COVID-19 Surgical Mask Strap & Ear Saver – Free
With us all being on hold during the COVID-19 crisis, it’s important to remember it’s only temporary and we need to look to the future, and that also means your taxes.
Over the years IT providers have become the ‘gatekeepers’ of technology, with the introduction of IoT things have begun to change.
Hackers know people are desperate for COVID-19 information, uncertainty means they can exploit you. 3 Tops to help secure you from COVID-19 scams
One of my clients has created a petition to have OMA and MOHLTC to keep Virtual Care Codes after COVID-19. Letting OHIP patients keep access to virtual care post COVID-19 will improve efficiency and the quality of care.
Too many of my emails are vendors offering to sell me something for COVID-19 . .. just stop.
The year is 2020, and in the climate today, we all must take risk management seriously. Cybercrime is rampant, and we are beginning to realize… Read More »Do I need cyber insurance?
In the rush to work remotely, do it securely. Six 6 tips to help keep you secure, 5 to avoid at all costs!
Let’s assume that last week your account quit, just up and left. Would you be able to go to the bank, access your accounts, continue… Read More »Can your it person hold you hostage?
Have you considered the implication if Ottawa were to have a city-wide shutdown due to COVID-19? Today, the Mayor of Ottawa urged residents to work from… Read More »Is your business prepared for dealing with a pandemic?
Disaster recovery is a basic element of good business continuity planning. Business continuity planning refers to the broad range of plans created so that a… Read More »Ransomware and disaster recovery plans
All companies, whether they are large or small, require many of the same things to remain competitive. The challenge is, “economies of scale,” places the… Read More »MSP’s help solve the “Economies of scale” dilemma
This cyberattack scheme isn’t new, but it has become increasingly common over the past several years. Many of the viruses lurking out there steal data… Read More »Ransomware attacks just keep increasing
If you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options open to you. Ransomware is a… Read More »Three responses after a Ransomware attack
That secure wifi password is almost no security at all! WiFi is ubiquitous, easy and part of your everyday life. We all talked about how… Read More »Your WiFi isn’t as secure as you think
Your domain name is the face of your organization on the internet and as such, it is important that your domain name reflects your brand. … Read More »DNS Domains?
After more than a decade in the IT field, I’ve seen the evolution of numerous IT departments. Many of our clients start out the same… Read More »Why IT isn’t a part-time job.
Effective September 19th the City of Ottawa has renamed Stafford Road West to Menten Place! Stafford Road West has always been difficult to find, most… Read More »Good-bye Stafford Road West, Hello Menten Place
Nearly every business and consumer regularly users wireless (Wi-Fi) networks to enable their laptops and other devices to access the internet. It’s quick, easy and… Read More »Everyone Uses Wi-Fi, it’s secure, right?
We’ve worked with many small businesses over the years and have witnessed clients who have suffered a few misses and we’ve been on standby as others suffered near-critical hits.