Customer Login

If you have an emergency, a question,
or just need advice, give us a call: (604) 980-2700

Blog

Employees Are the Weakest Link in Computer Security – How to Help Them Stay Safe icon
Employees Are the Weakest Link in Computer Security – How to Help Them Stay Safe

Fast, cunning and ever adaptable, cybercriminals consistently find ways to infiltrate your security systems and get at your data. Their best bet? Your employees. How great is the threat? The APWG (Anti Phishing Working Group) reported that the number of phishing websites it detected jumped a startling 250 percent between October 2015 and March 2016. […]

Tips on How to Detect Phishing Scams icon
Tips on How to Detect Phishing Scams

As the holiday season approaches, we always see a jump in the number of e-mail scams, malvertising and phishing attacks. The bad guys know we’re busy, more willing to donate to charities, and we’re looking for online shopping deals at this time of year. They’re willing to take advantage of us at every opportunity, and […]

SOPHOS Intercept X – The new defence against exploits and ransomware icon
SOPHOS Intercept X – The new defence against exploits and ransomware

Endpoint Protection Sophos Intercept X detects malicious behaviour using behaviour-based screening at endpoints instead of signature-based protection, which needs continuous updating. Behaviour based endpoint screening outruns attackers’ creations of new kinds of malware. Exploit Prevention By examining process behaviour, Intercept X pinpoints 24 techniques used in malware infiltration, greatly improving the identification of zero-day attacks. […]

Why Ignoring the Threat of Ransomware Could Cost You Your Business icon
Why Ignoring the Threat of Ransomware Could Cost You Your Business

You’ve been reading about it – hearing about it and now you’re wondering if you should be doing more to protect your data against ransomware. The short answer is yes, and the sooner the better. You should be doing everything possible to protect your data because the threat of ransomware is real, prevalent, and very […]

Traditional Backup Vs. Intelligent Business Continuity icon
Traditional Backup Vs. Intelligent Business Continuity

Traditional backup methods, such as tape, disk, or online only, are no longer sufficient. In fact, leading edge business owners are finding them unacceptable, due to their inability to recover data quickly and mitigate downtime. Technological innovations have established a comprehensive new standard, Intelligent Business Continuity (IBC). Only an IBC solution will ensure data protection, […]

The Ultimate Disaster Recovery Checklist icon
The Ultimate Disaster Recovery Checklist

Stay one step ahead of potential disasters. Prepare yourself before disaster strikes. When it comes to data backup and disaster recovery (BDR), being prepared for potential disasters is key to keep your business running. It’s not only important to have a disaster recovery solution you trust, but to make sure you test it as well. […]

The Business Continuity Checklist icon
The Business Continuity Checklist

What To Ask Every Backup And Disaster Recovery Vendor. Here are the top 10 questions that you should ask to choose the right BDR vendor. 1. Do you provide a hybrid cloud backup solution? A hybrid cloud backup solution is optimal to achieve intelligent business continuity, as it encapuslates the best of the private and […]

The ABCs of Business Continuity icon
The Cost of Ransomware [Infographic] icon
Ransomware / Cryptolocker Incidences and Reporting Statistics [Infographic] icon