Blog News

Zero Trust – What You Need to Know

As more and more organizations adapt to the new realities of the remote and hybrid workforces and the ever-changing cybersecurity landscape, they must also change…

Read More

Can Phishing Simulations Help Reduce Cyber Risk?

In a previous article we talked about what cybersecurity awareness training is and how it has helped organizations and their employees be aware and prepared…

Read More

What is Cybersecurity Awareness Training?

Cybersecurity awareness training programs have been around for many years. Over the last couple of years these programs have gained traction. With remote or hybrid…

Read More

Have You Heard About Ransomware-as-a-Service?

Ransomware continues to be one of the most persistent and pervasive cyber threats. The one constant with ransomware is that it continues to evolve and…

Read More
Phishing, smishing, vishing

Phishing, Smishing, Vishing – What’s the Difference?

In the IT world there are many words and acronyms used that mean something to those of us in the industry but that may not…

Read More

Ransomware Beliefs That Can be Detrimental to Organizations

Although ransomware attacks continue to increase, many organizations still don’t believe that it could happen to them or that they should do anything to prepare…

Read More

Azure Virtual Desktop vs Windows 365: What is the Difference?

As we mentioned in a previous blog Desktop as a Service (DaaS) is a cloud-based offering where the backend is hosted by a third party….

Read More

Common Reasons for Adopting Azure Virtual Desktop

There have been significant changes in the last several years in the way organizations of all sizes serve their customers. The same applies to their…

Read More

The Benefits of Electronic Signatures for SMBs

An electronic signature is a process of attaching an encoded signature to an electronic document. Electronic signatures are legally binding based on federal and provincial…

Read More

What Is Desktop as a Service?

Desktop as a Service (DaaS) is a cloud based offering where the backend is hosted by a third party. These hosted desktops are also known…

Read More

Securing the Hybrid Work Environment

From what we can tell the hybrid work environment is an environment that many businesses are operating in and will operate in for the foreseeable…

Read More

Quick Tips for Reducing Everyday Business Expenses

The cost of everything has skyrocketed over the last couple of years. From technology to office supplies, prices have increased. Supply chain challenges have created…

Read More

What SMBs Should Expect From Today’s IT Service Providers

The role of an IT service provider has changed over the years. It used to be that it was enough to just be good with…

Read More

Find a MicroAge near you

With a growing Network of independently owned locations (currently at 41) from coast-to-coast, MicroAge is Canada’s leading IT solutions and service provider focused mainly on small and midmarket businesses.

Most commented posts

Infrastructure informatique, IT infrastructure

5 Benefits of an Optimized IT Infrastructure

Is your current IT infrastructure helping your business thrive in its industry or creating obstacles for growth? If you’re still not using cloud technologies to…

Read More
cyber-threats-cybermenaces

3 Critical Cyber Threats For Businesses in 2019

Malware, vulnerabilities, and social engineering are some of the main concerns for IT security professionals. Although the tactics used to target businesses and individuals are…

Read More
Cloud Infrastructure hébergée

3 Advantages of Using Cloud Infrastructure

Everyone knows that cloud computing is a hot trend, and its adoption should only increase over the next few years. According to one study published…

Read More
backup security routine

How to Implement a Successful Data Backup Routine

Data backups are absolutely essential for small and large businesses alike to prevent downtime, disruption, and delays. Without smart backup solutions, your company’s information becomes…

Read More
next-gen security

Next-Gen Security Offerings – What Does It Mean?

The topography of threats for business organizations is rapidly evolving, and the stakes are rising higher as businesses become more reliant on remote access and…

Read More