Latest News

Cybersecurity Layers – Part 3

So far in this three-part series of articles focused on a layered approach to cybersecurity we have covered the people, perimeter, network, and endpoints. In…

Read More

Cybersecurity Layers – Part 2

In the first article of this three-part series, we talked about taking a layered approach to developing and implementing a solid cybersecurity strategy. We talked…

Read More

Cybersecurity Layers – Part 1

As we enter the holiday season and people and organizations are planning their holiday get togethers and parties with friends, family, and colleagues, we thought…

Read More

Can Phishing Simulations Help Reduce Cyber Risk?

In a previous article we talked about what cybersecurity awareness training is and how it has helped organizations and their employees be aware and prepared…

Read More

What is Cybersecurity Awareness Training?

Cybersecurity awareness training programs have been around for many years. Over the last couple of years these programs have gained traction. With remote or hybrid…

Read More
Phishing, smishing, vishing

Phishing, Smishing, Vishing – What’s the Difference?

In the IT world there are many words and acronyms used that mean something to those of us in the industry but that may not…

Read More

Ransomware Beliefs That Can be Detrimental to Organizations

Although ransomware attacks continue to increase, many organizations still don’t believe that it could happen to them or that they should do anything to prepare…

Read More

Azure Virtual Desktop vs Windows 365: What is the Difference?

As we mentioned in a previous blog Desktop as a Service (DaaS) is a cloud-based offering where the backend is hosted by a third party….

Read More

Common Reasons for Adopting Azure Virtual Desktop

There have been significant changes in the last several years in the way organizations of all sizes serve their customers. The same applies to their…

Read More

What Is Desktop as a Service?

Desktop as a Service (DaaS) is a cloud based offering where the backend is hosted by a third party. These hosted desktops are also known…

Read More

Securing the Hybrid Work Environment

From what we can tell the hybrid work environment is an environment that many businesses are operating in and will operate in for the foreseeable…

Read More

What SMBs Should Expect From Today’s IT Service Providers

The role of an IT service provider has changed over the years. It used to be that it was enough to just be good with…

Read More

Key Cybersecurity Requirements for Cyber Insurability

When an organization or business becomes a victim of a cybersecurity incident, having cybersecurity insurance can help with some of the costs that are associated…

Read More

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

cybersecurity banner

3 Reasons To Trust MicroAge With Your Cybersecurity

Cybersecurity has always been a concern for businesses, but the threats we all face are only expected to increase. By 2020, the average cost of…

Read More
it costs

3 ways to control your IT costs this summer

As the COVID-19 pandemic took the world by storm a few months ago, one of the results from the forced confinement by authorities was the…

Read More
maximize-it-assets-server-room

How to Maximize Your IT Assets

Productivity gains, competitive advantage, and better customer service are just a few reasons why companies should invest in technology. However, not all software and hardware…

Read More

How to Prepare for a Cybersecurity Incident

A recent report by research firm, CyberEdge Group, found that 85.7% of Canadian organizations experienced at least one cyberattack within a 12-month period in 2021….

Read More
GDPR PIPEDA

How to Keep Your Business Compliant with GDPR and PIPEDA Regulations

Identity protection and data security are the buzzwords of the tech industry, with laws like GDPR and PIPEDA being put in place to protect an…

Read More