Our Insights

Valuable information we share.

First Nations Protects Its Medical Data and Improves Health Care Delivery with Veeam, Clear Concepts and ThinkOn

Challenge: The Cowichan Tribes are a First Nation living on Vancouver Island. In an effort to improve the delivery of health care in their community, they created an electronic medical records system that is now used by First Nations across the country. The system honours their indigenous teachings and increases control of their health data, but it also comes with challenges.
Read More

Leverage the Power of Microsoft Teams

Microsoft Teams is one of the newest members of the Office 365 collaboration family that seems to have started revolutionizing the workplace. Microsoft Teams enhances the spirit of teamwork in the business market. Regardless of the size of your business, you can achieve more together with Microsoft Teams.
Read More

Implement an "Internal Cloud" for your Business

Gain the benefits of cloud computing but own the solution Businesses have been moving towards Cloud Computing at a rapid pace. There are many estimates on how quickly this is accelerating but the consensus is somewhere between 20% and 30% year over year growth for AWS and Azure. Cloud Computing has distinct advantages including the utility usage of storage and processing power, redundancy, and efficiency.
Read More

Why many businesses are outsourcing IT, and is it right for you?

The idea of hiring professional services firms instead of employing in-house staff is a compelling topic in today’s business market. Whether your business is outsourcing accounting, recruiting, or others, the bottom line is you need a trusted partner to fill an integral role in your company.  There are lots of reasons to contract certain services out, but why would IT be at the top of the list?
Read More

Things to Remember about Email Passwords

An email account with a simple or weak password puts your information at risk. Confidential attachments, messages, bank information, contact list, or personal conversations could fall into the wrong hands if an email account gets hacked due to a weak password.
Read More

Latest Email Threats: Homograph Exploits and Extortion Scam

Regular SPAM filtering just isn’t as effective as it used to be. We live in a time where threats are evolving on a global scale, rapidly working to disarm even the best email filtering solutions. Time and time again, new exploits of Phishing and Spoofing are designed to take advantage of the human condition.  Here are two of the more advanced tactics currently being utilized to gain access to private data or extort money:
Read More

Explaining the 3 2 1 Backup Rule

The more backup copies you have, the better your coverage against losing a full day of work or even worse your entire data. Ransomware, data corruption, accidental deletions, or environmental disasters, are just some of the dangers lurking to destroy your backups. Recovering data off dead drives costs lots of money, and that can easily be avoided if you have an effective backup strategy in place.
Read More

Cyber Kill Chain & Ransomware

The Cyber Kill Chain model breaks down a Ransomware attack in seven stages. This article will give you an understanding of our security solutions and what is effective based on the current stage of the Ransomware. 
Read More

Protect Yourself Against Macros and Malicious Websites

Macros – they are normally delivered as attachments in the form of a Microsoft Word document. Macros can either make your life easier by automating those repetitive stuff or destroy all of your work in seconds. It is exploited by attackers to infect systems and make demands against the victim.
Read More

4 Tips to Quickly Identify – Am I Getting Good Technical Support or Bad?

During my career in the support and service industry I’ve often wondered, “Am I or my team delivering the best possible service and support for our clients?”
Read More