Skip to content

Clear Concepts Insights

Stay connected with our IT experts. Clear Concepts Insights is our vehicle to share information and options that matter.

cloud-computing-800x533

Implement an Internal Cloud for your Business

Read More

Latest Posts

Why many businesses are outsourcing IT, and is it right for you?

The idea of hiring professional services firms instead of employing in-house staff is a compelling topic in today’s business market. Whether your business is outsourcing..

Read More

Things to Remember about Email Passwords

An email account with a simple or weak password puts your information at risk. Confidential attachments, messages, bank information, contact list, or personal conversations could..

Read More

Email Threats: Homograph Exploits and Extortion Scam

Regular SPAM filtering just isn’t as effective as it used to be. We live in a time where threats are evolving on a global scale, rapidly working to disarm even the best email..

Read More

Explaining the 3 2 1 Backup Rule

The more backup copies you have, the better your coverage against losing a full day of work or even worse your entire data. Ransomware, data corruption, accidental deletions, or..

Read More

Cyber Kill Chain & Ransomware

The Cyber Kill Chain model breaks down a Ransomware attack in seven stages. This article will give you an understanding of our security solutions and what is effective based on..

Read More

Protect Yourself Against Macros and Malicious Websites

Macros – they are normally delivered as attachments in the form of a Microsoft Word document. Macros can either make your life easier by automating those repetitive stuff or..

Read More

How Do I Get Rid of My Old Computer Equipment in Manitoba?

Do you have an old computer equipment graveyard? I’ve been to many new client’s offices only to be asked, “how do I get rid of all this junk taking up an entire storage room?”. We..

Read More

Protect your Backups from Ransomware

Ransomware scans network locations where the infected user has read and write access. Files under documents, desktop, and the shared folders you have access are examples of..

Read More

Risks of Unsecured Remote Desktop Connections

The ability to connect to your work computer or remote desktop server remotely provides added productivity to some employees. However, the risks of having this incorrectly..

Read More