 
            Eden Reid
Filter by
 
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  3 min read
                              
                              Four Reasons You Need Data Backups
                                  Data loss can happen at any time and you don't want to be caught unprepared. Thankfully, many organizations today recogn...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  3 min read
                              
                              Why Outsourced Onsite IT Support is Overrated
                                  To be clear, we're specifically addressing out-sourced IT with the third-party engineers onsite.
Out-sourced onsite IT s...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  4 min read
                              
                              How Voice Technology Is an Alternative To Touching Your Keyboard
                                  Did you know that your keyboard is filthy? Not your keyboard in particular, but everyone's? We touch our computer keyboa...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  2 min read
                              
                              Cyberattacks: A Matter of Life and Death
                                  Last week the College of Nurses in Ontario was hit by a ransomware cyberattack that threatened to compromise personal da...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  1 min read
                              
                              Cybersecurity Alert - Emergency Windows Server Patch
                                  Over the weekend, the Cybersecurity and Infrastructure Security Agency (CISA), a federal agency overseen by the Departme...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  7 Min Read
                              
                              Top 5 Places Businesses Should Use Multi-Factor Authentication
                                  We break down the top 5 most common entry points for hackers – which is where multi-factor authentication should definit...
                              
                              
                              Read More