How to Protect Your Mobile Device from Malicious Apps

People love installing apps on their mobile devices. They have downloaded a whopping 28.7 billion programs from the Google Play store and 9.1 million apps from the Apple App Store in the second quarter of 2020 alone. Before including programs in their stores, both Google and Apple put them through a vetting process to weed out malicious apps. However, some …

Meet Microsoft 365 Business Voice

Microsoft 365 Busines Voice is the all-in-one communication solution for small and medium businesses (SMB) that Microsoft released in Canada in the fall of 2019. It integrates with Microsoft 365 (formerly Office 365) and brings together calling, meetings, and messaging in one single application, Microsoft Teams. Let’s look at some of the ways SMBs can benefit from integrating Microsoft 365 …

6 Ways to Make Your Virtual Meetings Productive

As we are all adapting, to what everyone refers to as, the “new normal” caused by a virus that will continue to live with us for the foreseeable future, virtual meetings have become a daily occurrence. Internal meetings and external meetings have moved online. Making sure that these virtual meetings are as energetic, engaging and as productive as face to …

3 Main Components for Your Company’s Return to the Office

For most of us, the last few months have meant adhering to lockdown rules to minimize the spread of COVID-19. As lockdown restrictions across the country and around the world begin to slowly ease, businesses begin to think about reopening their offices. However, being prepared for this return will go a long way to avoiding issues with having people back …

5 Ways to Maintain Business Continuity During the Coronavirus Crisis

As the economy across the country begins to slowly reopen, operating in this new environment can be challenging. Companies need to consider the health and safety of their employees and their clients as COVID-19 continues to be present. They need to consider more complex work environments with some employees working remotely while others are working from the office and how …

Six Phases of Incident Response

A cybersecurity incident can be defined as an attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system. This is quite a broad definition and could encompass almost any out-of-the-ordinary event on an information system in your organization. Anything from discovering malware to identifying suspicious user activity, could be …

Key Players in the Fight Against Cyberattacks

Cyber criminals have no off season and neither should your security. Here’s a list of the cybersecurity solutions that should be used together to be your offence and defense. Perimeter Security Good security always starts with a strong perimeter. When firewalls were created in the early days of network computing, they were essentially the only layer of security between a …

SaaS, IaaS, and PaaS: What’s the Difference?

You have probably seen the acronyms SaaS, IaaS, and PaaS before, but do you know what they mean? Discover what these acronyms represent and, more important, the differences between them. The IT industry is embracing the shift from ownership-based business models to service-based ones. Vendors are increasingly offering their hardware, software, and other IT products as cloud services rather than …

Is Your SaaS Data at Risk?

Companies that assume their SaaS provider will restore application data they accidentally lose are risking permanently losing that data. Learn why SaaS providers are not required to restore this data and what you can do to avoid permanent data loss. Software as a Service (SaaS) is the largest segment of the cloud computing market, with revenue expected to reach $113 billion …