Four Ways to Enhance Your Endpoint Security Henrique ReisOctober 25, 2017Each device represents an access point for threats like viruses and malware. Learn about how…
The familiar USB is coming to an end Henrique ReisOctober 12, 2017The USB ports we've come to know and love are coming to an end—and that's…
End-of-life software: What are the dangers? Natasha GolinskyJuly 27, 2017End-of-life software’s: does it really affect your business? Read this article originally posted by Spiceworks…
If you use Wi-Fi on your iOS device, get this security update Natasha GolinskyJuly 20, 2017Apple released the security update on Wednesday to stop an exploit that targeted open Wi-Fi…
Why Should You Use a Mac? Natasha GolinskyJuly 6, 2017Have you caught yourself wondering "Mac vs PC." Keep reading this article, to see our…
WannaCry Security in a nutshell – What is it? How to defend yourself. Natasha GolinskyMay 16, 2017What is the WannaCry virus? How to protect yourself and your company. Protect with antivirus,…
The Declining State of Data Backups Natasha GolinskyMay 12, 2017Bad practices for doing data backups on small business and medium sized businesses networks. What…
New MacOS Virus Can be Spying on You! Natasha GolinskyMay 8, 2017New Apple MacOS virus is capable of spying on HTTPS secure traffic. Mac viruses and…
Security: The Problem Natasha GolinskyApril 25, 2017Cyber attacks are commonplace in today's business world. Learn how to improve your business' security.
Why Do Some Companies Still Not Have a Disaster Recovery Plan? Natasha GolinskyApril 12, 2017There are many companies today, in Southwestern Ontario, which still do not have a Disaster…