Latest News

Best Practices for Cybersecurity Awareness Training Programs

Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention…

Read More

Avoid Becoming a Victim of Social Engineering

In any conversation regarding cybersecurity, the topic ultimately turns to phishing and the social engineering tactics that make this the most effective strategy for cybercriminals…

Read More

To Pay or Not to Pay: That is the Question That Ransomware Victims Must Answer

Most people never heard of the Colonial Pipeline Company before May 2021, even though it transports 45% of all fuel consumed on the US East…

Read More

To Pay or Not to Pay: That is the Question That Ransomware Victims Must Answer

Most people never heard of the Colonial Pipeline Company before May 2021, even though it transports 45% of all fuel consumed on the US East…

Read More

Preparing for Compliance to the Modernization of Privacy Laws in Canada

With all the different legislation either already enacted or being enacted in different jurisdictions, organizations may find it difficult to determine what they need to…

Read More

Have you Heard About the Cybersecurity Onion?

Cybersecurity continues to be a top concern for businesses in Canada. This is not a surprise. In 2021, 85.7% of Canadian organizations experienced at least…

Read More

The Modernization of Privacy Laws and What This Means for Your Business

In a digital world where personal information is so easily collected and may easily be used for malicious intent, concerns about privacy and the protection…

Read More

The Modernization of Privacy Laws and What This Means for Your Business

In a digital world where personal information is so easily collected and may easily be used for malicious intent, concerns about privacy and the protection…

Read More

How to Prepare for Disruptions Caused by Cloud Service Outages

You don’t have to look very hard to find examples of cloud service outages. In June of last year, a huge cloud service outage caused…

Read More

Why Collaboration Data Needs to be Backed Up

In today’s business environment, the majority of collaboration content is acted upon and stored electronically in Software as a Service (SaaS) applications such as M365….

Read More

5 Reasons to Back Up Your Microsoft 365 Data

Many SMBs have moved to the cloud to take advantage of all the benefits that it can offer. A common misconception, however, is that the…

Read More

What is the Difference Between Cloud Storage and Cloud Backup?

The cloud has become more pervasive in the last few years and in particular, the last two years. It has certainly helped businesses with their…

Read More

Why IT Will Cost More in 2022

In a previous blog this month, we talked about planning your IT budget and investments for 2022. In this blog, we will dig a little…

Read More

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

managed it services

Why Having Managed IT Services is Critical for Your Business

There are many aspects needed for a modern and successful business: valuable products, an ambitious sales force, a growth strategy, and a strong and stable…

Read More

The Case for Cloud Collaboration Tools

When the COVID-19 pandemic took the world by storm and governments ordered shutdowns and restricted businesses from opening, the companies that were able to transition…

Read More
Benefits of Microsoft Teams

5 Main Benefits of Microsoft Teams for SMBs

In the past year, the adoption of Microsoft Teams has seen exponential growth. The growth was driven for the need to adopt communication and collaboration…

Read More

Avoid Becoming a Victim of Social Engineering

In any conversation regarding cybersecurity, the topic ultimately turns to phishing and the social engineering tactics that make this the most effective strategy for cybercriminals…

Read More
cybrsecurity: zero tolerance

How to protect endpoint devices with the Zero Trust model? 

The Zero Trust model offers a cybersecurity approach which calls into question the usual trust granted to networks and users within an IT system. Contrary…

Read More