Latest News

Azure Virtual Desktop vs Windows 365: What is the Difference?

As we mentioned in a previous blog Desktop as a Service (DaaS) is a cloud-based offering where the backend is hosted by a third party….

Read More

Common Reasons for Adopting Azure Virtual Desktop

There have been significant changes in the last several years in the way organizations of all sizes serve their customers. The same applies to their…

Read More

What Is Desktop as a Service?

Desktop as a Service (DaaS) is a cloud based offering where the backend is hosted by a third party. These hosted desktops are also known…

Read More

Securing the Hybrid Work Environment

From what we can tell the hybrid work environment is an environment that many businesses are operating in and will operate in for the foreseeable…

Read More

What SMBs Should Expect From Today’s IT Service Providers

The role of an IT service provider has changed over the years. It used to be that it was enough to just be good with…

Read More

Key Cybersecurity Requirements for Cyber Insurability

When an organization or business becomes a victim of a cybersecurity incident, having cybersecurity insurance can help with some of the costs that are associated…

Read More

What Risks are Generally Covered Under Cyber Insurance Policies?

When an organization becomes a victim of a cybersecurity incident, having cybersecurity insurance can help with some of the costs that are associated with recovering…

Read More

How to Prepare for a Cybersecurity Incident

A recent report by research firm, CyberEdge Group, found that 85.7% of Canadian organizations experienced at least one cyberattack within a 12-month period in 2021….

Read More

The Benefits of Electronic Signatures for SMBs

An electronic signature is a process of attaching an encoded signature to an electronic document. Electronic signatures are legally binding based on federal and provincial…

Read More

Preparing to Create Your Incident Response Plan

Often, when we consider creating incident response plans, we have cyber incidents in mind. This is not surprising, given the ever-increasing frequency of cyber attacks…

Read More

Patch Management Best Practices

Right up there with human error, unpatched systems are one of the top causes of data breaches. According to the Ponemon Institute, over 57% of…

Read More

Best Practices for Cybersecurity Awareness Training Programs

Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention…

Read More

Best Practices for Cybersecurity Awareness Training Programs

Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention…

Read More

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

cloud data back up

5 Reasons Your Company Should Use the Cloud for Data Backups

From emails with malicious files to zero-day vulnerabilities, the risks to business data are everywhere. An excellent strategy to prevent information loss and protect your…

Read More
microsoft azure

What is Microsoft Azure?

Cloud computing is a concept used with increasing frequency in the past few years as its popularity in the business industry continues to skyrocket. Statistics show that…

Read More
Multi factor authentication

Everything You Should Know About Multi-Factor Authentication (MFA)

Most of us only use five or fewer passwords for all the applications and services we use. That includes both work related and personal apps…

Read More
cybersecurity bad practices

3 Very Risky Practices to Avoid When it Comes to Cybersecurity

With so many different types of cyberattacks being launched against companies these days, a common question among businesses looking to improve their defenses is “Where…

Read More
Cybersecurity Layers - Part 1

Cybersecurity Layers – Part 1

As we enter the holiday season and people and organizations are planning their holiday get togethers and parties with friends, family, and colleagues, we thought…

Read More