Customer Login

If you have an emergency, a question,
or just need advice, give us a call: (604) 980-2700

Blog

Maximizing AI in Cybersecurity Training for Effective Ransomware Defence icon
Maximizing AI in Cybersecurity Training for Effective Ransomware Defence

Ransomware attacks have become increasingly prevalent in recent years, posing significant risks to organizations of all sizes and types. These attacks can cause significant disruptions to business operations, damage to reputation, and financial losses. As a result, cybersecurity training has become essential to an organization’s overall security strategy to help combat these threats. And with […]

What Is Managed Threat Response? icon
What Is Managed Threat Response?

Managed Threat Response (MTR) provides 24/7 threat hunting, detection, and response capabilities delivered by an expert team as a fully managed service.  It provides resource-constrained organizations with the expertise and the workforce necessary to benefit from Sophos’ detection and response capabilities. A Managed Threat Response service provides customers with remotely delivered modern security operations center (MSOC) […]

Guide to Securing Your Mobile Device icon
Guide to Securing Your Mobile Device

Mobile device users love the convenience of their phones and tablets. However, while we take full advantage of apps, portability, and fast communication, we forget that these same features sacrifice security. As threats to our mobile devices increase in scope and complexity, we must take steps to protect our mobile data and information. Our phones […]

How to Protect Your Data Against WannaCry and other Ransomware icon
How to Protect Your Data Against WannaCry and other Ransomware

WannaCry is an aptly named virus that infects unpatched computer systems worldwide. It is widespread and continues to be one of the most common and damaging ransomware threats.

Securing Your SaaS Data Against Ransomware Attacks icon
Securing Your SaaS Data Against Ransomware Attacks

There are increasingly more reasons to invest in cybersecurity – especially for small and mid-sized businesses. Ransomware protection, in particular, is a critical investment for businesses looking to avoid an IT crisis. And the problem is growing…currently, 1 in 3 companies will lose SaaS data. SaaS is an acronym for “Software-as-a Service”, think Office365, Dropbox, G-Suite etc. […]

Datto State of the Channel Ransomware Report for Canada  icon
Datto State of the Channel Ransomware Report for Canada 

Datto, the market leader in business continuity services provided through MSPs, has a significant presence in Canada, with about 1,100 partners of their approximately 14,000 global partners. 250 of those Canadian partners were surveyed in the preparation of the Ransomware Report for Canada. Key Findings: Ransomware remains a massive threat to small-to-mid-sized businesses (SMBs). From […]

Don’t Think You Need Encryption? Think Again. icon
Don’t Think You Need Encryption? Think Again.

There is a good reason why major platforms such as Google, Facebook, and Amazon are carefully encrypting all data flowing between their websites and those of their users. And it’s the same reason you should be encrypting your data. Security. Recent stats show more companies are getting on board with this security measure. The 2019 […]

SIM Swapping Identity Theft and How To Protect Your Accounts icon
SIM Swapping Identity Theft and How To Protect Your Accounts

Canadians are targets as SIM card swapping scams increase in 2019. Vancouver entrepreneur Sefton Fincham was a victim of SIM swapping this year while on a business trip to the US. He said the “signal changed suddenly” on his phone and then there was no service. He was completely mystified and worked, with no immediate […]

Phish Threats Are Evolving. How Smart Users Make Safer Networks icon
Phish Threats Are Evolving. How Smart Users Make Safer Networks

What is the first thing that comes to mind when people think of phish threats and cybersecurity solutions? Usually, you’ll hear all about firewalls, antivirus, encryption, and other products you can buy that are designed to protect your network. As most cybersecurity companies worth their salt will tell you, a good security plan involves many […]

How To Implement Mobile Device Security For Your Employees’ BYOD icon
How To Implement Mobile Device Security For Your Employees’ BYOD

In this post, we describe the risks of using personal mobile devices in the workplace and offer solutions for managing that risk. Mobile Device Use Today, employees frequently bring their computing devices such as smartphones, laptops, and tablets to the workplace for use and connectivity on the corporate network.  They also use their devices on […]