Future of Business Connectivity Webcast Featuring Guests
August 31, 2022 | 
Blog Technology

An in-depth look at the future of business connectivity and how to make sure you’re using the best technologies for your business.   CMO Devon Gillard recently hosted an exciting webcast with our friends at iTel Networks. iTel is Canada’s leading data infrastructure organization. Not only do we recommend them to our clients for affordable […]

Image - What is Windows Autopilot?
May 31, 2022 | 
Blog Technology

If you’ve recently onboarded a new employee, this scenario might sound familiar: it’s Monday morning and they’ve just arrived, ready to work, but HR forgot to let IT know the new hire’s start date. The employee’s computer is sitting in its box on their desk. Even with advance notice, it takes IT about a day, and sometimes longer, to get a company’s machine set up to business standards with all the necessary applications installed. But it doesn’t have to be that way. And you may already own the solution; you just didn’t know what it was or hadn’t activated your subscription. It’s called Autopilot.

Changing Landscape of Cyber Threats - What's new in 2022
March 23, 2022 | 
Blog Cyber Security Technology

Last year, more than half of Canadian businesses hit by ransomware or malware paid the ransom amounts demanded by cybercriminals in 2021. To educate businesses on how to protect their data, we recently brought together three key industry experts to share lessons and tips with our webinar attendees: Tom Sides, partner at Dentons Canada LLP; Brendan Salvo, Director at Blackpoint; and Calvin Engen, Chief Technology Officer at F12.net. Hosted by Devon Gillard, Chief Marketing Officer at F12.net. Here are the key takeaways from the webinar. 

Upgrading to Windows 11 - A First Look From a Non-Techy Lense
November 15, 2021 | 
Blog Technology

While F12’s solutions design team is busy testing and hardening Windows 11 for the business world, many are starting to get their first look at consumer devices. So, our CMO, Devon Gillard, asked his father-in-law, Murdoch Macleod, a retired journalist, to share his experience. And he didn’t hold back!

Vital IT Considerations During Mergers & Acquisitions
August 27, 2021 | 
Blog Cyber Security Disaster Recovery Technology

Merging businesses can be stressful for owners, management teams, and employees. Problems with information technology (IT) on either side will only compound the workload involved in the process. Here is a closer look at what to look out for and how to avoid pitfalls.

August 16, 2021 | 
Blog Managed IT Subscription Based IT Technology

DaaS is an all-inclusive virtual cloud desktop service designed for businesses of all sizes. In previous decades, organizations had to purchase desktop computers (and allied hardware) for each employee and equip them with all the necessary software. They also had to recruit an IT team to maintain, troubleshoot, and update all their computer systems, resulting in substantial technology overheads.

What is IT Infrastructure, and Why does it Matter for Your Business
July 28, 2021 | 
Blog Technology

In 2021, it is impossible to imagine any business running without an IT infrastructure. We have come to rely on information technology for virtually every aspect of our working and personal lives. Here is a closer look at what IT infrastructure means, why it is so essential for your business, and how you can protect yourself from IT problems.

CMMC Regulations
June 1, 2021 | 
Blog Cyber Security Technology

Is your business providing services to the United States DoD? Or are you thinking of becoming a trusted supplier for the department but don’t know where to start as a Canadian business when it comes to being a trusted supplier under the new CMMC scheme? This blog post is for you. 

Why You Need to Risk Assess Your IT Systems (1)
April 14, 2021 | 
Blog Cyber Security Technology

As every business owner knows, risk assessments play a fundamental role in reducing a company’s chances of experiencing costly problems such as reputational damage, loss of essential assets, impediments to service delivery, violation of international or national laws, or even injury to staff members.

5-best-practices-for-secure-video-conferencing (1)
March 16, 2021 | 
Blog Cyber Security Technology

  With technology evolving rapidly over the last few years, it has become a staple within just about every business environment. The traditional concept of working in an office daily started to dwindle as the opportunity to work from home became possible through different vices like remote desktops and workspaces and, more commonly, video conferencing. […]