Latest News

Do more with less: how to optimize your efficiency?

In today’s highly competitive market, one of the main challenges for businesses is how to stand out from the competition. To succeed in standing out,…

Read More

How can your business benefit from the solutions offered by an IT service provider?

With the tech sector booming and the accelerated advent of all things digital, businesses must make the switch to digital to optimize efficiency, ensure their…

Read More

Cyber attacks have evolved – Are you prepared for 2023?

Cybersecurity continues to be a top concern for organizations. A recent study of close to 2900 IT decision makers of organizations with 10 to 300…

Read More

What are the consequences of an IT shortage?

The impact of labour shortages is growing in almost all business sectors, including, unfortunately the IT department. This reality is especially true with the advent…

Read More

Password Management Solutions … Safe, Secure, and Simple to Use

With the cybersecurity incident first revealed by LastPass last August and updated a few weeks ago on December 22nd, questions have arisen on whether password…

Read More

Planning Your Cybersecurity Budget for 2023

For many organizations, this is the time of year for forecasts and budgets for the upcoming year. From an IT perspective there are many considerations…

Read More

Cybersecurity Layers – Part 3

So far in this three-part series of articles focused on a layered approach to cybersecurity we have covered the people, perimeter, network, and endpoints. In…

Read More

Cybersecurity Layers – Part 2

In the first article of this three-part series, we talked about taking a layered approach to developing and implementing a solid cybersecurity strategy. We talked…

Read More

Cybersecurity Layers – Part 1

As we enter the holiday season and people and organizations are planning their holiday get togethers and parties with friends, family, and colleagues, we thought…

Read More

Can Phishing Simulations Help Reduce Cyber Risk?

In a previous article we talked about what cybersecurity awareness training is and how it has helped organizations and their employees be aware and prepared…

Read More

What is Cybersecurity Awareness Training?

Cybersecurity awareness training programs have been around for many years. Over the last couple of years these programs have gained traction. With remote or hybrid…

Read More
Phishing, smishing, vishing

Phishing, Smishing, Vishing – What’s the Difference?

In the IT world there are many words and acronyms used that mean something to those of us in the industry but that may not…

Read More

Ransomware Beliefs That Can be Detrimental to Organizations

Although ransomware attacks continue to increase, many organizations still don’t believe that it could happen to them or that they should do anything to prepare…

Read More

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

IT staffing services

How IT Staffing Services Can Help Your Business

Between vacation periods, special projects, and of the shortage of manpower, especially in the IT industry, it can be hard for businesses to have the…

Read More
digital transformation numerique

Digital Transformation – Now or Never

Digital transformation has been a buzzword for years and every year, pundits declared that this was the year of digital transformation.  IDC predicted in late 2018…

Read More

How to Know if DaaS is Right for Your Business

Over the last several blogs we have looked at what Device-as-a-Service (DaaS) is, its benefits, and how it differs from leasing. DaaS is a growing…

Read More

Best Practices for Cybersecurity Awareness Training Programs

Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention…

Read More
cybrsecurity: zero tolerance

How to protect endpoint devices with the Zero Trust model? 

The Zero Trust model offers a cybersecurity approach which calls into question the usual trust granted to networks and users within an IT system. Contrary…

Read More