Customer Login

If you have an emergency, a question,
or just need advice, give us a call: (604) 980-2700

Blog

How to Protect Your Data Against WannaCry and other Ransomware icon
How to Protect Your Data Against WannaCry and other Ransomware

The WannaCry ransomware attacked organizations around the world – most notably in Europe and the UK. To date, it has affected over 200,000 companies in over 150 countries.  Though temporarily halted, the infection resurged as hackers began creating new versions…… Read More…

5 Reasons Why You Should Not Mind Your Own Business IT icon
5 Reasons Why You Should Not Mind Your Own Business IT

The first question a small or mid-size business owner asks about outsourcing the management of their information technology is: Why do we need managed services? We have employees that know about software, programming, servers, firewalls, backup systems and so on,…… Read More…

Social Engineering Is A Mind Game: Is Your CEO at Risk? icon
Social Engineering Is A Mind Game: Is Your CEO at Risk?

A mind-game is difficult to identify, so is a well-crafted social engineering scam. Both are forms of psychological manipulation; neither is welcome in your business. Today’s socially engineered phishing attacks are so sophisticated that even your most knowledgeable employees’ may…… Read More…

How to Identify an Email Scam in 10 Seconds or Less icon
How to Identify an Email Scam in 10 Seconds or Less

Your inbox is a potential ticking time bomb of email phishing scams. Every time you open an email you run the risk of losing: Your passwords Your hard-earned money Your identity Your Job Your reputation Email phishing scams change daily……. Read More…

Why Cybercriminals Target Canadian Small and Mid-Size Businesses icon
Why Cybercriminals Target Canadian Small and Mid-Size Businesses

The alarming facts about ransomware attacks in Canada Cyber security attacks through the use of ransomware are an increasing threat to Canadian businesses.[i] While the United States is reported to be the most affected region for ransomware attacks over the…… Read More…

Employees Are the Weakest Link in Computer Security – How to Help Them Stay Safe icon
Employees Are the Weakest Link in Computer Security – How to Help Them Stay Safe

Fast, cunning and ever adaptable, cybercriminals consistently find ways to infiltrate your security systems and get at your data. Their best bet? Your employees. How great is the threat? The APWG (Anti Phishing Working Group) reported that the number of…… Read More…

Tips on How to Detect Phishing Scams icon
Tips on How to Detect Phishing Scams

As the holiday season approaches, we always see a jump in the number of e-mail scams, malvertising and phishing attacks. The bad guys know we’re busy, more willing to donate to charities, and we’re looking for online shopping deals at…… Read More…

SOPHOS Intercept X – The new defence against exploits and ransomware icon
SOPHOS Intercept X – The new defence against exploits and ransomware

Endpoint Protection Sophos Intercept X detects malicious behaviour using behaviour-based screening at endpoints instead of signature-based protection, which needs continuous updating. Behaviour based endpoint screening outruns attackers’ creations of new kinds of malware. Exploit Prevention By examining process behaviour, Intercept…… Read More…

Why Ignoring the Threat of Ransomware Could Cost You Your Business icon
Why Ignoring the Threat of Ransomware Could Cost You Your Business

You’ve been reading about it – hearing about it and now you’re wondering if you should be doing more to protect your data against ransomware. The short answer is yes, and the sooner the better. You should be doing everything…… Read More…

Traditional Backup Vs. Intelligent Business Continuity icon
Traditional Backup Vs. Intelligent Business Continuity

Traditional backup methods, such as tape, disk, or online only, are no longer sufficient. In fact, leading edge business owners are finding them unacceptable, due to their inability to recover data quickly and mitigate downtime. Technological innovations have established a…… Read More…