Local Expertise
MicroAge offers innovative, reliable, flexible and cost-effective solutions that are entirely tailored to simplify and update your computing environment. MicroAge offers customized solutions designed to help you achieve your goals and improve your business performance.

How we can help
Solutions & Services
Get better results from your IT assets
Need IT expertise to help you make your business more efficient or more competitive? MicroAge will determine the technology requirements to formulate an action plan. Contact us for more information.
Blog
Latest from MicroAge
Cyber Resilience: How To Protect Your Business In A Connected World?
It’s hardly new, nowadays digital technology pervades practically every aspect of our lives. In many contexts, this ever-so-useful practical and accommodating reality also involves a…
Read MoreAre You At Risk Of Business Email Compromise (BEC)?
Business Email Compromise (BEC) is a type of cybercriminal attack that is aimed mainly at businesses and organizations. It usually involves a process of sophisticated…
Read MoreMicrosoft and Samsung team up to boost work phone security
You’ve checked your pockets, your bag, under pillows … and then it hits you. You left your work phone on the table at the coffee…
Read MoreWhy Encrypt Your Data?
In our increasingly connected world where personal data, confidential information and private conversations are constantly in transit and being stored digitally, the risks of being…
Read MoreGoogle Calendar has a great update for hybrid workers
It seems like lately we’ve been hearing all about the new updates coming out of Microsoft… but they’re not the only kids on the block!…
Read More3 ways AI makes almost any business task easier
In the fast evolving world of technology, business owners and managers like you are always on the lookout for the next big thing to give…
Read MoreRisk of data breaches linked to using ChatGPT
Ever since its launch in November 2022, ChatGPT has gained a lot of traction for the way it is revolutionizing the internet. At work or…
Read MoreThis is the latest trend in phishing attacks
Have you heard the saying, “A picture is worth a thousand words”? It seems cyber criminals have too, and they’re using it to their advantage….
Read MoreHow to Choose Between a Penetration Test and a Vulnerability Assessment?
At the risk of sounding repetitive, the main IT issue for organizations revolves around every aspect of cybersecurity. To protect their systems, large and small…
Read MoreHow to protect endpoint devices with the Zero Trust model?
The Zero Trust model offers a cybersecurity approach which calls into question the usual trust granted to networks and users within an IT system. Contrary…
Read MoreStop! And think, before you act on that email
How many times a day do you respond to an email without really thinking about its contents? Maybe it’s a request for some information….
Read MoreMultilayered cybersecurity: network and endpoints
Now that cyberattacks have become more and more sophisticated and widespread, it’s hardly surprising that they are the main business concern of Canadian companies according…
Read MoreIs your business data at risk? Don’t take chances with old tech
When you replace old computers or external drives, do you delete data and then just… get rid of them? You could be putting your sensitive…
Read MoreHere’s how cyber criminals try to hack your accounts while you sleep
Have you ever felt frustrated by the flood of notifications from your multi-factor authentication (MFA) app? Well, cyber criminals have too. And they’re taking advantage…
Read MoreThe final curtain call for Windows 10: What you need to know
Microsoft has announced that the current version of Windows 10, released in 2022, will be its final release. If you’re currently using Windows 10, you…
Read MoreArtificial Intelligence, For Better or Worse
Artificial intelligence is playing an ever more significant role in the reality of many businesses mainly to bridge the cybersecurity gap. AI is beneficial for…
Read MoreCan your business go green by switching to the cloud?
Cloud computing has quickly become a popular option for businesses that want to streamline their operations, reduce costs, and become more flexible. But are you…
Read MoreWindows 11 optional update: Why it’s better to wait
Microsoft has just announced an option for people to trial new features before their general release in Windows 11. This isn’t about fixes to security…
Read MoreCharging in public places? Watch out for “juice jacking”
In past years, personal cell phones have not been included in most discussions regarding cybersecurity, especially as it pertains to business. Unfortunately; however, this has…
Read MoreWhy is continuous cybersecurity training crucial for your business?
The world of technology is in constant and rapid change. Cyberthreats develop, advance and improve every day in step with the behaviour of users. Cybersecurity…
Read MoreLinkedIn takes action to tackle fake accounts
LinkedIn is introducing new verification features over the coming months to help tackle fake accounts. The business-focused social platform is a fantastic place to connect…
Read MoreThe First 2 Steps Towards Optimizing Your Overall Cybersecurity
More than ever, the priority for businesses, in IT terms, is to develop resilient cybersecurity strategies to reduce the risk of malicious security breaches. We…
Read MoreMicrosoft hints at some exciting Windows 12 developments
We’re fickle creatures. Windows 11 still feels like a new toy, yet we’ve already heard (reliable) speculation about Windows 12 arriving as soon as next…
Read MoreHow to optimize your multilayered cybersecurity posture?
Even though technology and IT support are indispensable to the functioning and sustainability of many businesses, they also bring their share of challenges. Concerns are…
Read MoreCriminals are exploiting AI to create more convincing scams
One of the many cool things about the new wave of Artificial Intelligence tools is their ability to sound convincingly human. AI chatbots can be…
Read More3 essential security tools for every business
Your data is one of your most valuable business assets. Keeping it safe should be one of your main priorities. So if you don’t…
Read MoreMicrosoft 365 makes Multi-Factor Authentication easier
Sometimes the tools that we use to keep our organizations secure can actually slow down our productivity. Fortunately, things are getting better. and software developers…
Read MoreAre your productivity tools actually slowing you down?
Productivity tools are supposed to make you more, well… productive. But if they’re not embedded properly within your business, tasks can actually end up taking…
Read More3 tricks for getting the most out of your Microsoft 365 License
Organizational reality for businesses has evolved in recent years. Hybrid or remote work models are common and largely appreciated by employees but, at the same…
Read MoreDo more with less: how to optimize your efficiency?
In today’s highly competitive market, one of the main challenges for businesses is how to stand out from the competition. To succeed in standing out,…
Read MoreBot malware is a growing security threat
If we talk about ‘bots’ you’d be forgiven for thinking of the amazing AI chatbots that have been all over the news lately. But this…
Read MoreDon’t forget your phone when you think about cyber security
Our phones are a goldmine of private information. Just think of all the financial details, personal messages, banking apps, photos and contact information that live…
Read MoreCyber attacks are getting bigger and smarter. Are you vulnerable?
Have you ever tried to buy tickets for a huge event and found that the seller’s website has collapsed under the weight of thousands of…
Read MoreHow can your business benefit from the solutions offered by an IT service provider?
With the tech sector booming and the accelerated advent of all things digital, businesses must make the switch to digital to optimize efficiency, ensure their…
Read MoreAI is making phishing scams more dangerous
AI chatbots have taken the world by storm in recent months. We’ve been having fun asking ChatGPT questions, trying to find out how much of…
Read MoreWhat are the consequences of an IT shortage?
The impact of labour shortages is growing in almost all business sectors, including, unfortunately the IT department. This reality is especially true with the advent…
Read MoreIs your security focusing on the right things?
To protect your home from an intruder you make sure your doors and windows are all locked and secured. You might go further: build a…
Read MoreYoung employees have different attitudes to cyber crime
If you employ anyone aged between 16 and 19, you need to pay special attention to the cyber security training you’re giving your team. A…
Read MoreTake action to avoid a spookily clever new phishing scam
Another day, another scam. And this is a sneaky one. Cyber criminals are getting smarter. This recent malware threat is unusually smart. It impersonates a…
Read MoreWhen did you last have a health check?
How’s the January health kick going? Lots of us take our health seriously – once a year, anyway – and it’s good to spend time thinking…
Read MorePassword Management Solutions … Safe, Secure, and Simple to Use
With the cybersecurity incident first revealed by LastPass last August and updated a few weeks ago on December 22nd, questions have arisen on whether password…
Read MorePlanning Your Cybersecurity Budget for 2023
For many organizations, this is the time of year for forecasts and budgets for the upcoming year. From an IT perspective there are many considerations…
Read MoreBusinesses are spending more on IT this year
As a business owner or manager, you know how important good IT is. Your business couldn’t function without it. Your IT isn’t just about computers…
Read MoreA little trust goes a long way…
Countless employers still don’t trust their people to do their best work unless they’re physically in the office. But while managers may be struggling to…
Read MoreWindows is the prime target for cyber criminals
With its huge dominance in the workplace, Microsoft’s Windows has become the prime target for cyber criminals. They’re looking to access your information, disrupt your…
Read MoreAre your people Christmas shopping from work?
Almost half of people with social media accounts have admitted to falling for shopping scams. So if members of your team are doing a little…
Read MoreHappy Holidays!
As 2022 comes to an end, the team here at MicroAge Chilliwack is wishing everyone well this holiday season. We will continue provide the best…
Read MoreMost ransomware victims would pay up if attacked again
Ransomware is one of the fastest growing cyber-crimes in the world. Last year, 37% of businesses were victim to an attack. In case you didn’t…
Read MoreCybersecurity Layers – Part 3
So far in this three-part series of articles focused on a layered approach to cybersecurity we have covered the people, perimeter, network, and endpoints. In…
Read MoreCybersecurity Layers – Part 2
In the first article of this three-part series, we talked about taking a layered approach to developing and implementing a solid cybersecurity strategy. We talked…
Read MoreCybersecurity Layers – Part 1
As we enter the holiday season and people and organizations are planning their holiday get togethers and parties with friends, family, and colleagues, we thought…
Read MoreWhy you will not be fine on this Cloud9
We go to a lot of effort working to protect our clients from online security threats. These could come in the form of key loggers…
Read MoreAndroid 13 is safer for your business
We all use our phones for a lot more than sending messages and making the occasional call. And that means most of your staff are…
Read MoreCan Phishing Simulations Help Reduce Cyber Risk?
In a previous article we talked about what cybersecurity awareness training is and how it has helped organizations and their employees be aware and prepared…
Read MoreWhat is Cybersecurity Awareness Training?
Cybersecurity awareness training programs have been around for many years. Over the last couple of years these programs have gained traction. With remote or hybrid…
Read MoreAre you using Teams to share sensitive data?
Microsoft Teams has fast become one of the most useful business tools for the way we work today. No matter where your people work from,…
Read MorePhishing, Smishing, Vishing – What’s the Difference?
In the IT world there are many words and acronyms used that mean something to those of us in the industry but that may not…
Read MoreRansomware Beliefs That Can be Detrimental to Organizations
Although ransomware attacks continue to increase, many organizations still don’t believe that it could happen to them or that they should do anything to prepare…
Read MoreMake sure your cloud server is protected from this
Using a cloud server to drive your business’s technology is a smart idea. The benefits are huge. You can use as little or as much…
Read MoreAre you using a malicious browser extension without realizing?
There are hundreds of thousands of browser extensions designed to help us to save time, be more productive, and personalize our online experience. And while…
Read MoreAzure Virtual Desktop vs Windows 365: What is the Difference?
As we mentioned in a previous blog Desktop as a Service (DaaS) is a cloud-based offering where the backend is hosted by a third party….
Read MoreCommon Reasons for Adopting Azure Virtual Desktop
There have been significant changes in the last several years in the way organizations of all sizes serve their customers. The same applies to their…
Read MoreTwo thirds of remote workers use a faulty device, so they don’t get into trouble
There are a lot of reasons to take a second look at remote working, but we really didn’t expect this next one… A new report…
Read MoreIs your business making these cyber security mistakes?
It feels like every day we’re being warned about a new threat to our cyber security, doesn’t it? That’s for good reason. Last year, ransomware…
Read MoreWhat Is Desktop as a Service?
Desktop as a Service (DaaS) is a cloud based offering where the backend is hosted by a third party. These hosted desktops are also known…
Read MoreSecuring the Hybrid Work Environment
From what we can tell the hybrid work environment is an environment that many businesses are operating in and will operate in for the foreseeable…
Read MoreWhat SMBs Should Expect From Today’s IT Service Providers
The role of an IT service provider has changed over the years. It used to be that it was enough to just be good with…
Read MoreKey Cybersecurity Requirements for Cyber Insurability
When an organization or business becomes a victim of a cybersecurity incident, having cybersecurity insurance can help with some of the costs that are associated…
Read MoreWhat Risks are Generally Covered Under Cyber Insurance Policies?
When an organization becomes a victim of a cybersecurity incident, having cybersecurity insurance can help with some of the costs that are associated with recovering…
Read MoreHow to Prepare for a Cybersecurity Incident
A recent report by research firm, CyberEdge Group, found that 85.7% of Canadian organizations experienced at least one cyberattack within a 12-month period in 2021….
Read MoreThe Benefits of Electronic Signatures for SMBs
An electronic signature is a process of attaching an encoded signature to an electronic document. Electronic signatures are legally binding based on federal and provincial…
Read MoreIs working from home really good for your business?
Working from home. Or remote working, as it’s now called… It’s the big thing in business right now, isn’t it? And some people love it….
Read MoreIf any of your staff work remotely, you need to be on top of this
Remote and hybrid working is now normal for a lot of people. But a recent survey has found that, despite it being more than two…
Read MoreWhat does the global chip shortage mean for your business?
You don’t have to look very hard to find examples of cloud service outages. In June 2021, a huge cloud service outage caused many high-profile…
Read MoreSome employees won’t stop using apps that could be a security risk
It’s likely a lot of the applications and software tools you’re using now are different from the ones your business used before the pandemic. That’s…
Read MoreMicrosoft’s taking a responsible leadership position on AI
Microsoft’s taking a responsible leadership position on AI Microsoft’s decided to retire and rework an AI tool that could not only recognize our facial features,…
Read MoreIs It Hot Enough for Ya?
As hot as we may like the weather, your computer is not a big fan of heat. And dust is the number one cause of computer overheating. So it is important to your computer’s longevity and functionality to give it a thorough cleaning on a regular basis.
Read MorePreparing to Create Your Incident Response Plan
Often, when we consider creating incident response plans, we have cyber incidents in mind. This is not surprising, given the ever-increasing frequency of cyber attacks…
Read MoreHas Your IT Service Provider Changed as Your Needs Have Changed?
There is no arguing with the fact that the COVID-19 pandemic has forced businesses to adjust and change the way they do business. Some of…
Read MoreRemote Access for Fun and Profit
While there are many benefits to remote access, it would be irresponsible to overlook the risks involved with workers having access to your business through insecure networks and computers.
Read MorePatch Management Best Practices
Right up there with human error, unpatched systems are one of the top causes of data breaches. According to the Ponemon Institute, over 57% of…
Read MoreBest Practices for Cybersecurity Awareness Training Programs
Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention…
Read MoreAvoid Becoming a Victim of Social Engineering
In any conversation regarding cybersecurity, the topic ultimately turns to phishing and the social engineering tactics that make this the most effective strategy for cybercriminals…
Read MoreTo Pay or Not to Pay: That is the Question That Ransomware Victims Must Answer
Most people never heard of the Colonial Pipeline Company before May 2021, even though it transports 45% of all fuel consumed on the US East…
Read MorePreparing for Compliance to the Modernization of Privacy Laws in Canada
With all the different legislation either already enacted or being enacted in different jurisdictions, organizations may find it difficult to determine what they need to…
Read MoreOnly Fools Don’t Back Up Their Data
It may be a little late for an April Fools kind of post, but not backing up your data properly would be foolish! It is so easy to end up losing data when you don’t take the necessary precautions. Between technology glitches, hackers and system meltdowns, there is a good chance that somewhere along the line you are going to be in the position of needing to recover some, if not all, of your data.
Read MoreTech Strategies to Extend Innovation & Growth
It is no secret that improved technology can drive growth and innovation within a company. There are many, many options that can support and lead to that growth. In this blog we will zero in on a couple that any business can use to take their company to the next level.
Read MoreHave you Heard About the Cybersecurity Onion?
Cybersecurity continues to be a top concern for businesses in Canada. This is not a surprise. In 2021, 85.7% of Canadian organizations experienced at least…
Read MoreThe Modernization of Privacy Laws and What This Means for Your Business
In a digital world where personal information is so easily collected and may easily be used for malicious intent, concerns about privacy and the protection…
Read MoreHow to Prepare for Disruptions Caused by Cloud Service Outages
You don’t have to look very hard to find examples of cloud service outages. In June of last year, a huge cloud service outage caused…
Read MoreBig Changes Coming to Microsoft 365 This Year!
They are calling it “The New Commerce Experience” (NCE). What does that mean to you? Well, in August of last year, Microsoft announced price increases across most of their Microsoft 365 license types. Their plan is to simplifying the license procurement process, aligning all offerings to the Enterprise Agreement model.
Read MoreDon’t Leave Your Cloud App Data Vulnerable
When cloud computing was first introduced, most businesses were reluctant to try the apps being offered by public cloud service providers. Companies were mainly concerned…
Read MoreWhy Collaboration Data Needs to be Backed Up
In today’s business environment, the majority of collaboration content is acted upon and stored electronically in Software as a Service (SaaS) applications such as M365….
Read MoreWhat is the Difference Between Cloud Storage and Cloud Backup?
The cloud has become more pervasive in the last few years and in particular, the last two years. It has certainly helped businesses with their…
Read More5 Reasons to Back Up Your Microsoft 365 Data
Many SMBs have moved to the cloud to take advantage of all the benefits that it can offer. A common misconception, however, is that the…
Read MoreIT Concerns? We’ve Got You Covered
Sometimes the world of IT troubleshooting can be very similar to what my son had to figure out in order to make it to me through that door. We may not always know what is on the other side, but we have learned that as IT and security experts using our skills and extensive knowledge, we will find the solution and provide you with the results you need.
Read More