Preparing to Create Your Incident Response Plan
Often, when we consider creating incident response plans, we have cyber incidents in mind. This is not surprising, given the ever-increasing frequency of cyber attacks…
Often, when we consider creating incident response plans, we have cyber incidents in mind. This is not surprising, given the ever-increasing frequency of cyber attacks…
Right up there with human error, unpatched systems are one of the top causes of data breaches. According to the Ponemon Institute, over 57% of…
Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention…
Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention…
In any conversation regarding cybersecurity, the topic ultimately turns to phishing and the social engineering tactics that make this the most effective strategy for cybercriminals…
Most people never heard of the Colonial Pipeline Company before May 2021, even though it transports 45% of all fuel consumed on the US East…
Most people never heard of the Colonial Pipeline Company before May 2021, even though it transports 45% of all fuel consumed on the US East…
With all the different legislation either already enacted or being enacted in different jurisdictions, organizations may find it difficult to determine what they need to…
With all the different legislation either already enacted or being enacted in different jurisdictions, organizations may find it difficult to determine what they need to…
Cybersecurity continues to be a top concern for businesses in Canada. This is not a surprise. In 2021, 85.7% of Canadian organizations experienced at least…
In a digital world where personal information is so easily collected and may easily be used for malicious intent, concerns about privacy and the protection…
In a digital world where personal information is so easily collected and may easily be used for malicious intent, concerns about privacy and the protection…
You don’t have to look very hard to find examples of cloud service outages. In June of last year, a huge cloud service outage caused…
As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!
We offer end-to-end IT and security solutions to businesses of all sizes across Canada, helping our clients leverage our expertise to drive better business results, secure their businesses, and stay competitive.
How to Train Your Staff to be Savvy About Cyber Security Threats
As a business owner, you do everything you can to keep your business safe. You think before checking strange emails, you avoid risky sites, and…
The Industry Of Hacking: Understanding The Business Behind Cybercrime
Cybercrime is big business with some hackers making massive annual profits. With the world being so dependent on technology, cybercriminals have loads of opportunities. There…
What Should Be Included In A Cyber Incident Response Plan
Protecting your business against cyberattacks involves ensuring that you have in place the different security layers including protecting the network, patching applications, protecting the endpoints,…
Patch Management Best Practices
Right up there with human error, unpatched systems are one of the top causes of data breaches. According to the Ponemon Institute, over 57% of…
How to Avoid Staffing Outages with IT Staffing Services
Your staff and the abilities they possess are what can make or break your business. Having a fully staffed team can make any challenge easy…