Blog

Stay ahead of cyberthreats with our articles.

DMARC, DKIM, SPF concept pic
IT Solutions

DMARC, DKIM, SPF Record – Improve Email Security

If you want to improve your spam score, increase email deliverability, stop ending up in junk folders, and reduce phishing and impersonation emails from your domain, DMARC, DKIM and SPF Records can help.  As a managed IT services provider in Toronto, it’s a little shocking

Read More »
IT Policies for small business Canada cover
Resources

Recommended IT Policies For Small Business In Canada

Technology management is complex. Clearly defined policies provide clarity. Below is a list of some of the more common useful policies for Canadian organizations to help you manage technology, security and expectations. Recommended IT Policies BYOD Policy The legal agreement defining the use of both

Read More »
identity management concept 98c64splf51
Mobility

How to Use Microsoft Identity Manager (MIM)?

Even though more and more Canadian businesses are reopening, many have decided to continue with their remote work and Bring Your Own Device (BYOD) arrangements. A 2021 McKinsey survey found that 9 out 10 organizations will rely on remote and on-site working in 2022 for

Read More »
antivirus not enough concept
Security

Is Antivirus Enough To Protect Small Business Data?

Commercial antivirus software were wildly popular a few years ago and many companies still swear by them to protect their online IT infrastructure and computer networks. However, do their claims to protect computers from malicious attacks still hold up to modern IT security standards? The

Read More »
NIST Compliance Guide PDF cover
Resources

Definitive Guide to NIST Compliance in Canada

Even after a century since its inception in 1901, the National Institute of Standards and Technology (NIST) continues to be an extremely important body of governance for businesses all around the world, including Canada. The NIST Framework for Improving Critical Infrastructure and Cybersecurity assists both

Read More »

Stay Current

We'll send you relevant IT news 1-2 per month, and never share your information.

Digital concept of Email Security - Fraud Prevention
Security

Skyrocketing Email Attacks On Small Business

As a small business owner you are proud of your digital presence. You’ve built your website, manage your social media following, send out email marketing messages and have your team working in email day to day. Now, more than ever, it’s all at risk from

Read More »
using chatgpt in small business
IT Planning

How to Use ChatGPT In Small Business Responsibly

Chat GPT has is dominating headlines in new outlets, blog posts and podcasts. Giants like Bing and Google are leveraging this artificial intelligence language model to change the way we search for information. Companies such as Amazon user similar AI models to deliver customer service.

Read More »
push bombing concept with multiple authentication codes sent to user
Cloud Services

Push-Bombing Threats Can Bypass 2FA

In this post we cover a new threat called push-bombing so that if it happens to you or your team, you know what to do. In order to learn or grow, we have to challenge assumptions.  First, let’s challenge the assumption that every password you and

Read More »
Woman using MFA on laptop and SSO for cloud apps
Security

MFA vs SSO for Small Business IT Security

As a small business owner, you may wonder how you can make it easier for your team to log in to  the many apps they all use, and more importantly, how to easily change the login credentials for all those apps when staff changeovers happen.

Read More »
Employee working from Trusted Devices in a small business office.
Security

What is a Trusted Device?

Protecting company email accounts is critical to your IT security because gaining access to an email address is a cyber criminals dream. Bad actors can silently mine a compromised account for years. They will use or sell the information gathered. So how do you keep

Read More »
it management tips hero
IT Planning

IT Risk Management For Small Business in Canada

IT risk management for small business owners is challenging, requires continuous monitoring and adjustments and regular review and planning. Most small business owners lack the time and experience to maintain effective IT risk management strategies in house.  Yet in today’s world, IT risk management is

Read More »
cloud apps shared liability concept photo
Cloud Services

Your Security Gaps With Secure Cloud Apps

If you are using a popular cloud app such as QuickBooks, HubSpot, RentMagic, Yardi, Tableau, TobiiPro, Dentrix, AbleDent or anything else, you might assume everything is secure. And that is true. It’s also false. Here’s what you need to know about your IT security responsibility

Read More »

Microsoft InTune Permissions and Privacy

You are thinking of switching to Microsoft InTune security tools & processes, and naturally, you have a few questions about the permissions InTune asks for on each device and your privacy. We address those concerns and demonstrate that neither InTune or your IT management services

Read More »

Schedule A Consultation