Why You Need to Risk Assess Your IT Systems (1)
April 14, 2021 | 
Blog Cyber Security Technology

As every business owner knows, risk assessments play a fundamental role in reducing a company’s chances of experiencing costly problems such as reputational damage, loss of essential assets, impediments to service delivery, violation of international or national laws, or even injury to staff members.

5-best-practices-for-secure-video-conferencing (1)
March 16, 2021 | 
Blog Cyber Security Technology

  With technology evolving rapidly over the last few years, it has become a staple within just about every business environment. The traditional concept of working in an office daily started to dwindle as the opportunity to work from home became possible through different vices like remote desktops and workspaces and, more commonly, video conferencing. […]

21-F12 0098 Blog Graphics FNL 4
February 10, 2021 | 
Blog Cyber Security

  In today’s economy, where working from home is quickly becoming the norm, and businesses rely on the Internet, you’d be right to think that the Internet helps us be more connected and competitive than ever before.    Unfortunately, it also means that it’s never been easier for cybercriminals to get a hold of our […]

What is CyberSecure Canada?
December 9, 2020 | 
Blog Cyber Security

What is CyberSecure Canada, and why is it a secret? The Canadian government quietly launched CyberSecure Canada, a national cybersecurity certification for small and mid-sized companies. This program is a huge step toward securing Canada from cyber threats – it is a pity more business leaders do not know about it. What is the CyberSecure […]

Cyber Security
September 14, 2020 | 
Blog Cyber Security Managed IT

Cyber-attacks are on the rise in recent months as criminals take advantage of work from home arrangements and vulnerable IT systems. Read more to learn how you can protect your data and urgent counter-measures you can take. Federal Alert The Canadian Centre for Cyber Security, a federal agency, recently issued an alert about a wave […]

Microsoft lifecycles
August 13, 2020 | 
Blog Cyber Security Managed IT

  Several core Microsoft products have reached “end of life.” What does this mean? Why should you care and how can F12 help? Continue reading to learn more: Product Lifecycle Primer Microsoft Products come with expiry dates, and, as with seafood and potato salad, you are wise to take heed. There are four main reasons […]

cyber threats
June 24, 2020 | 
Blog Cyber Security Managed IT

The proliferation of remote workforces has been a responsible, sensible response to a worldwide pandemic. Interestingly, this shift in the business model might be more permanent than its initial position as an emergency measure. Through collaborative technologies such as Microsoft Teams, organizations have found that work can get accomplished and cohesiveness maintained. All without paying […]

What is Ransomware
June 9, 2020 | 
Blog Cyber Security Managed IT

  In 2018, there were 204 million ransomware attacks around the world. The best way to prevent a ransomware attack, or mitigate the damage, is to be informed. Check out some answers to FAQs about ransomware here. What Is Ransomware? Ransomware is malicious software that basically kidnaps your system and holds it and your data […]

COVID Response Update
May 14, 2020 | 
Blog Cyber Security Disaster Recovery Managed IT

Many provinces have announced plans to gradually reopen businesses closed due to the COVID-19 (coronavirus) pandemic. As a result, employees will begin returning to their physical workplaces, some from layoffs and others from work at home arrangements. Below we outline ten IT considerations to help smooth the transition. Include IT in Planning Make sure to […]

Cloud Security
May 10, 2020 | 
Blog Cyber Security Data Center and Cloud Managed IT

Cloud computing has facilitated work for many businesses large and small the world over. Unfortunately, it also creates a vulnerability to hackers for those who use it. Over 7,000 vulnerabilities, in fact. Most of those 7,000 vulnerabilities will never be exploited thanks to cloud security. Intrigued? Let’s look at some quick FAQs about cloud computing […]