security icons denoting pipeda compliance

What small business owners in Canada need to know about staying compliant with Microsoft Office 365. As Canadian small business owners gear up for another year of e-privacy and data protection regulation, it’s a good time to review Microsoft Office 365’s status in light of PIPEDA compliance. As you know, the Canadian Personal Information Protection…

Read Full Post
cloud storage versus cloud backup icons

As small business IT Consultants in Toronto, we take a lot of calls from small business owners looking for the right IT solutions to meet their needs. One common misconception is around cloud storage versus cloud backup. If your business is using OneDrive, Google Drive or Dropbox storage, you may have a false sense of…

Read Full Post
server farm

There are two primary options for hosting data for businesses: in-house servers and cloud-based servers. Which option is right for your company? The answer to this question will be different for everyone and should be dependent on several factors. For example, do you have one office or several? What size is your business? Do you…

Read Full Post
email lock icon on keyboard depicting encrypted email.jpg

Sending an email is like sending a letter through Canada Post, without an envelope. It can be easily intercepted and read. For this reason, sensitive information should never be sent via regular email.  If you work with sensitive client info information, consider the encrypted email in Office 365 feature. Email encryption is concealing information in…

Read Full Post
Office 365 logo under magnifying glass

When it comes to online security, small oversights commonly made by small business owners can quickly become big problems. If you are using Office 365 should team members have global administrator permissions?  The short answer is no. Today, our team at TUCU will explore Office 365 security, and explain how small business owners and their…

Read Full Post
cloud security concept

In this post we cover how Office 365 benefits small business in some key ways you may not have considered. As SMB IT Consultants, we’ve found that many small businesses would like to switch to cloud-based IT systems, for the convenience of using apps in the cloud, but never consider all the security benefits of…

Read Full Post
Mobile device management post art

Mobile Device Management (MDM) allows your IT manager or IT support company to remotely troubleshoot mobile devices and to enforce IT security policies such as screen locks and strong passwords.  MDM also allows for separation of personal and company owned data on mobile devices, and is considered a must have for any BYOD policy. Today we…

Read Full Post
Microsoft Office 2007

On October 10, 2017, Office 2007 will reach End of Life, which means the software is being retired and no longer supported. Unsupported software does not receive security updates and leaves you open to viruses, malware and breaches. In addition, as of October 31, 2017, Outlook 2007 will be unable to connect to Office 365…

Read Full Post