Latest News

Azure Virtual Desktop vs Windows 365: What is the Difference?

As we mentioned in a previous blog Desktop as a Service (DaaS) is a cloud-based offering where the backend is hosted by a third party….

Read More

Common Reasons for Adopting Azure Virtual Desktop

There have been significant changes in the last several years in the way organizations of all sizes serve their customers. The same applies to their…

Read More

What Is Desktop as a Service?

Desktop as a Service (DaaS) is a cloud based offering where the backend is hosted by a third party. These hosted desktops are also known…

Read More

Sécuriser l’environnement de travail hybride

D’après ce que nous pouvons dire, l’environnement de travail hybride est un environnement dans lequel de nombreuses entreprises opèrent et opéreront dans un avenir proche….

Read More

Securing the Hybrid Work Environment

From what we can tell the hybrid work environment is an environment that many businesses are operating in and will operate in for the foreseeable…

Read More

Quick Tips for Reducing Everyday Business Expenses

The cost of everything has skyrocketed over the last couple of years. From technology to office supplies, prices have increased. Supply chain challenges have created…

Read More

Key Cybersecurity Requirements for Cyber Insurability

When an organization or business becomes a victim of a cybersecurity incident, having cybersecurity insurance can help with some of the costs that are associated…

Read More

What Risks are Generally Covered Under Cyber Insurance Policies?

When an organization becomes a victim of a cybersecurity incident, having cybersecurity insurance can help with some of the costs that are associated with recovering…

Read More

How to Prepare for a Cybersecurity Incident

A recent report by research firm, CyberEdge Group, found that 85.7% of Canadian organizations experienced at least one cyberattack within a 12-month period in 2021….

Read More

The Benefits of Electronic Signatures for SMBs

An electronic signature is a process of attaching an encoded signature to an electronic document. Electronic signatures are legally binding based on federal and provincial…

Read More

Creating Your Incident Response Plan 

In a previous article we wrote about the activities and information required to create an effective incident response plan. In this article we will talk…

Read More

Preparing to Create Your Incident Response Plan

Often, when we consider creating incident response plans, we have cyber incidents in mind. This is not surprising, given the ever-increasing frequency of cyber attacks…

Read More

Best Practices for Cybersecurity Awareness Training Programs

Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention…

Read More

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

IT staffing services

How IT Staffing Services Can Help Your Business

Between vacation periods, special projects, and of the shortage of manpower, especially in the IT industry, it can be hard for businesses to have the…

Read More
digital transformation numerique

Digital Transformation – Now or Never

Digital transformation has been a buzzword for years and every year, pundits declared that this was the year of digital transformation.  IDC predicted in late 2018…

Read More

How to Know if DaaS is Right for Your Business

Over the last several blogs we have looked at what Device-as-a-Service (DaaS) is, its benefits, and how it differs from leasing. DaaS is a growing…

Read More

Best Practices for Cybersecurity Awareness Training Programs

Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention…

Read More
cybrsecurity: zero tolerance

How to protect endpoint devices with the Zero Trust model? 

The Zero Trust model offers a cybersecurity approach which calls into question the usual trust granted to networks and users within an IT system. Contrary…

Read More