Business professional typing with a target icon above a key on the keyboard
June 27, 2022 | 
Blog Cyber Security

Managed Detection & Response (MDR) is an outsourced cybersecurity service that provides organizations with real-time 24/7 monitoring, detection, and response to security incidents without the immense challenge and expense of standing up an internal 24/7 Security Operations Centre (SOC).

Changing Landscape of Cyber Threats - What's new in 2022
March 23, 2022 | 
Blog Cyber Security Technology

Last year, more than half of Canadian businesses hit by ransomware or malware paid the ransom amounts demanded by cybercriminals in 2021. To educate businesses on how to protect their data, we recently brought together three key industry experts to share lessons and tips with our webinar attendees: Tom Sides, partner at Dentons Canada LLP; Brendan Salvo, Director at Blackpoint; and Calvin Engen, Chief Technology Officer at F12.net. Hosted by Devon Gillard, Chief Marketing Officer at F12.net. Here are the key takeaways from the webinar. 

Cyber Impacts of the Russian - Ukraine Conflict
March 2, 2022 | 
Blog Cyber Security

Cyberwarfare is a new battlefront, and we know friends and clients are asking how their business or supply chain might be impacted. As with the global pandemic, a single infectious viral strain can multiply and spark a crisis. In any crisis, it helps to be prepared.

F12 Infinite Blog
September 3, 2021 | 
Blog Cyber Security Data Center and Cloud Subscription Based IT

We are proud to present F12 Infinite – our very own full-service, subscription-based solution for any Canadian business looking for managed IT services. This is the future of managed IT. F12 Infinite delivers on what other services merely promise: it relieves the burden of dealing with technology from your business. Rather than spending time researching IT solutions, you can go back to building your core business. Our team has got your back where anything IT-related is concerned. 

Vital IT Considerations During Mergers & Acquisitions
August 27, 2021 | 
Blog Cyber Security Disaster Recovery Technology

Merging businesses can be stressful for owners, management teams, and employees. Problems with information technology (IT) on either side will only compound the workload involved in the process. Here is a closer look at what to look out for and how to avoid pitfalls.

Use at own Risk
July 7, 2021 | 
Blog Cyber Security Disaster Recovery

Billions of email users are aware of the risks of phishing. But what about ‘smishing’? It’s a growing trend with cybercriminals and potentially a threat to anyone using a smartphone. Understanding smishing is essential. Here is how to spot smishing attempts and how to protect yourself and your business against them. 

What is Smishing
June 21, 2021 | 
Blog Cyber Security

Billions of email users are aware of the risks of phishing. But what about ‘smishing’? It’s a growing trend with cybercriminals and potentially a threat to anyone using a smartphone. Understanding smishing is essential. Here is how to spot smishing attempts and how to protect yourself and your business against them. 

CMMC Regulations
June 1, 2021 | 
Blog Cyber Security Technology

Is your business providing services to the United States DoD? Or are you thinking of becoming a trusted supplier for the department but don’t know where to start as a Canadian business when it comes to being a trusted supplier under the new CMMC scheme? This blog post is for you. 

Why You Need to Risk Assess Your IT Systems (1)
April 14, 2021 | 
Blog Cyber Security Technology

As every business owner knows, risk assessments play a fundamental role in reducing a company’s chances of experiencing costly problems such as reputational damage, loss of essential assets, impediments to service delivery, violation of international or national laws, or even injury to staff members.

5-best-practices-for-secure-video-conferencing (1)
March 16, 2021 | 
Blog Cyber Security Technology

  With technology evolving rapidly over the last few years, it has become a staple within just about every business environment. The traditional concept of working in an office daily started to dwindle as the opportunity to work from home became possible through different vices like remote desktops and workspaces and, more commonly, video conferencing. […]