We Deliver Valuable and Cost-effective IT Solutions
Online Scams: Take Them Seriously
Although news of large corporate websites being hacked is reported on a regular basis, many small businesses fail to realize that they too, are a possible target for online scams. Even if you’re business is small, don’t move forward with
8 Common Phishing Scams to Avoid
Online fraud is at all time high. It’s in everyone’s best interest to have a basic understanding of the types of common phishing scams online fraudsters use. Help avoid a cyber crime attack by recognizing the signs. Here are eight
Cyber Security Breaches in Healthcare
No doubt about it, cyber security breaches are a major concern for everyone, even major websites. Recently a massive denial-of-service (DoS) attack shut down major websites across the internet, including Twitter and Spotify, a streaming music service. The Healthcare industry, in particular,
Why Managed Compliance is Important for LTC and Retirement Homes
Do you worry about your Long-Term Care or Retirement home being audited? Do you know if your patient data is secure? What would happen to if your patient data was compromised? Are you unsure of your regulatory compliance with CARP and PIPEDA (“Personal Information
Can a High-Tech LTC Home or Retirement Residence be Trouble Free?
Does your Long-Term Care Home or Retirement Residence suffer from the following technical troubles? Aging hardware Slow computers or network links No backup and limited security for data Inadequate Wireless coverage Staff that need more training and support What if
Free SSL Certificates with Managed Services
SSL Certificates are used to establish an encrypted connection between a computer browser and a web server. Secure Sockets Layer’s (SSL) technology activates a lock and the https protocol which allows for secure connections that protects sensitive information. Once that connection is established, all
Get Creative and Change your Common Passwords
Here’s a reminder to do something you probably haven’t done in a while…change your common passwords. And, while you’re at it, choose new passwords that are not so common. Some of the most commonly-used passwords, according to the security group SplashData, are “password”,
IT Funding for Long-Term Care Homes in Ontario
The Government of Ontario’s guidelines for Long-Term Care invoices can be confusing. The Ministry of Health and Long-Term Care insists on specific procedures to claim and capture funding, so it’s important to understand how to properly invoice expenditures for your Long-Term Care
Microsoft Azure Preview for Canadian Cloud Customers
The Canadian Cloud is happening. Microsoft’s plan to expand the Cloud into Canada is on track, with the delivery of an operational preview of Microsoft Azure cloud services to select customers. Last year, we told you about the announced plans to deliver locally hosted
A Virtual Data Center is a Modern Day Business Tool
Virtualization makes sense on so many levels; once you understand the benefits, it’s easy to understand why modern-day businesses are migrating to virtual data centers. Every business owner and administrator should understand why hosted data is the way to go.
Health Care: IT Measures for Patient Safety
As Ontario’s population ages, our health and long-term care industries must keep up with technological advancements. If they were once overburdened by slow and expensive innovation, that’s certainly not the case anymore. In fact, innovations in information technology today allow
Outsmart Cyber Criminals to Prevent Identity Theft
You may have heard it before, but… Prevention is the key to protecting your IT security and identity from cyber criminals. When you read that, don’t you just want to push that thought aside and say, “It won’t happen to
Evolving Needs of Long-Term Care Homes in Ontario
We’ve been working with Ontario long-term care homes for years, as an outsourced IT department. So, of course, we like to keep up with the latest goings on in the industry. The Ontario Long-Term Care Association’s report, This is Long-Term Care
Celebrating our 25th Anniversary with “The Force”
In celebrating our 25th anniversary, we wanted to do something extra special to mark the monumental occasion. On December 17th, 2015, we held an advanced screening of the highly-anticipated “Star Wars: The Force Awakens ” blockbuster. We invited all our
6 Tips To Keep Your Android Smartphone Battery Alive
Does charging your Android smartphone battery 5 times a day drive you nuts? Smartphone batteries are a daily source of angst for many people, as getting through a busy day on a full charge seems like somewhat of an
Simple Trick to Give your Old iPhone or iPad a Speed Boost
If you bought an iPhone Or iPad a couple of years ago, chances are, it’s either getting sluggish, or you’ve stopped using it because it got a lot sluggish. You need a speed boost. We all like to get the most out
You Really Want to Hire That Computer Guy from Craigslist?
Desperate times call for desperate measures, or so we’ve heard, but do you really want to hire a Computer Guy you’re not 100% certain is great? Think about it: everything you do within your organization depends on technology. If your
Wi-Fi Router: Gateway For Hackers?
If you keep up on the latest news, you’ve likely noticed a multitude of hacks occurring throughout the past few months. Is your WiFi router vulnerable? A common way for cyber criminals to steal and disclose confidential information is through hacking
How To Seek Out And Destroy Bloatware
Bloatware lurks in your new PC – how to find and destroy. When you buy a new PC with Windows, you do so knowing that there’s a bunch of software that’s already been loaded into it. Much of it is
Ransomware Disguised as Windows 10 Update
It’s common knowledge that cyber criminals work quickly; they pay close attention yo the IT world and hunt for vulnerabilities to prey on, or new software to use as a disguise for their attacks. With the release of Microsoft’s Windows