6 Tips to Effectively Work from Home
April 6, 2020 | 
Blog

Whether you have experienced the world of telecommuting before or not, your workplace dynamic has likely changed. For many of us, physically separating ourselves from others causes challenges. While we are divided by distance, we do not need to go into social isolation.   Here are 6 tips for working from home to ensure that […]

COVID-19 Release
March 12, 2020 | 
Blog

We have all watched, with growing concern, the worldwide spread of COVID-19 (coronavirus).  While the public health risk to Canadians is currently low, the situation can change rapidly. Indeed, yesterday the World Health Organization (WHO) officially declared a pandemic. We are part of a global community; we are in this together. Steps to Protect Our […]

what is an MSP
February 18, 2020 | 
Blog

An IT managed service provider (MSP) specializes in supplying a support framework for organizations that need a proactively monitored and managed IT environment. Traditional IT support companies provide technicians and consultants on an hourly basis.  On the other hand, MSPs provide a fully operational IT function, complete with the personnel, systems, standards, processes, and oversight […]

How To Protect Against Ransomware
January 28, 2020 | 
Blog

It’s no secret that ransomware is one of the biggest security concerns for organizations around the world. The scariest part is that hackers are even savvier than they were in the past which makes legacy systems and other deprecated technologies vulnerable to their efforts. What Is Ransomware? Ransomware is a subsect of the malware family […]

IT support
December 12, 2019 | 
Blog

Phishing, malware, ransomware, password breaches, and denial of service attacks—cybercrime is on the rise. If you don’t want your data to end up in the hands of online thieves, you’ll need an IT support plan in place. Here are some valuable tips on how to secure your network.

Is Your Business Cyber Secure
December 2, 2019 | 
Blog

The holiday shopping season is upon us and that means we have visions of cybersecurity for your Cyber Monday dancing in our heads. Read more for a few tips and best practices for small and medium-sized businesses (SMBs) to guarantee a happy holiday season with strong cybersecurity:

secure computer
November 30, 2019 | 
Blog

National Computer Security Day is the unofficial holiday of encouraging people to secure their computers and their personal information. And that includes small and medium-sized businesses. So, what can the average business do to secure their computer systems? It’s not that difficult to top off your computer security, and it’ll require minimal disruption of your business. Let’s look at a quick checklist you can use to improve your business’s computer security.

Portrait photo of Calvin Engen CTO at F12.net Inc.
November 18, 2019 | 
Company News

F12.net Inc. (“F12”) is delighted to announce the appointment of Calvin Engen as CTO. As F12’s CTO, Calvin will ensure F12 continues to reduce risk and complexity for Canadian businesses by crafting technology services that free leaders to focus on what they do best. His responsibilities include platform innovation, solution engineering, and the information security of every employee and client of F12.

Devon Gillard
April 30, 2019 | 
Company News

EDMONTON, April 29, 2019 – For Immediate Release F12.net Inc. (“F12”) is thrilled to announce the appointment of Devon Gillard as CMO. Since joining F12 as an IT Consultant in 2009, Devon’s progress can only be described at meteoric. In 2012, he became the General Manager of the Calgary branch. Under his leadership, it tripled […]

Cyber Security Bulletin: Canada in the Crosshairs
April 18, 2019 | 
Blog

Spring 2019 Cyber Security Bulletin  F12.net produces this bulletin to quickly inform business leaders and their teams about recent security threats and defensive steps they can take.  In this edition, we focus on high profile breaches to Canadian organizations. Feel free to forward this information to your colleagues and contacts. State of Security As phishing attacks […]