Skip to main content

IT Support

Stay up-to-date on the latest IT Support, Cybersecurity and business technology news and trends.

Network Security: Outside looking in

The fundamentals of network security remain the same. Firewalls, antivirus, backups, policies and procedures all play an important role in securing your digital assets.

Malware: Coming to a Mac near you!

For all of the Mac users out there that thought they were immune to viruses and malware it has been a really tough month.

The Cloud: A scary place sometimes

For some organizations moving resources into the ‘cloud’ is a way to improve scalability, mobility, availability without large capital investments in equipment and software. Although this sounds like a great scenario, is it possible you are paining a nice big red target on your back?

When the lights go out

Over the past week I have been dealing with a great number of calls related to power outages and equipment failures due to lightning strikes. […]

The power of IP

Business is in the process of really challenging the old conventions of employment. It used to be you were hired by a company, required to come into the office on a daily basis, complete your work and go home. For an increasing number of companies that is no longer a requirement. More and more firms are discovering the advantage to having a mobile workforce.

Is the Cloud really the way to go?

Has your company been thinking about moving some or all of your business processes into the Internet cloud?

Combating and managing spam

Spam is one of the largest problems facing organizations which use the email as a primary communications tool.

Security, security, security

As a society we have come a long way when it comes to understanding the importance of computer security. Most of us have the standard antivirus software installed and for the most part have figured out how to secure our wireless networks.

iPhone or Blackberry: Which smartphone is right for you?

The answer is… It depends! To compare the iPhone 3, 3GS or 4 to all of the different versions of the Blackberry would be near impossible. So I will be comparing the iPhone to the Blackberry in general not one specific model. Hopefully this information will help you decide which device is right for you!

Weak passwords and policies

Passwords are often your first line of defence, and in many instances, the only defence against hackers gaining access to your information. Passwords are like the keys to your car. Without them you are going nowhere and in the wrong hands your car and its contents are likely on the way down the road to a local chop-shop.

Ready to reach more customers online? Tell us about your project and let's get started.

Request a Quote