Latest News

Common Reasons for Adopting Azure Virtual Desktop

There have been significant changes in the last several years in the way organizations of all sizes serve their customers. The same applies to their…

Read More

What Is Desktop as a Service?

Desktop as a Service (DaaS) is a cloud based offering where the backend is hosted by a third party. These hosted desktops are also known…

Read More

Securing the Hybrid Work Environment

From what we can tell the hybrid work environment is an environment that many businesses are operating in and will operate in for the foreseeable…

Read More

What SMBs Should Expect From Today’s IT Service Providers

The role of an IT service provider has changed over the years. It used to be that it was enough to just be good with…

Read More

Key Cybersecurity Requirements for Cyber Insurability

When an organization or business becomes a victim of a cybersecurity incident, having cybersecurity insurance can help with some of the costs that are associated…

Read More

What Risks are Generally Covered Under Cyber Insurance Policies?

When an organization becomes a victim of a cybersecurity incident, having cybersecurity insurance can help with some of the costs that are associated with recovering…

Read More

How to Prepare for a Cybersecurity Incident

A recent report by research firm, CyberEdge Group, found that 85.7% of Canadian organizations experienced at least one cyberattack within a 12-month period in 2021….

Read More

The Benefits of Electronic Signatures for SMBs

An electronic signature is a process of attaching an encoded signature to an electronic document. Electronic signatures are legally binding based on federal and provincial…

Read More

Preparing to Create Your Incident Response Plan

Often, when we consider creating incident response plans, we have cyber incidents in mind. This is not surprising, given the ever-increasing frequency of cyber attacks…

Read More

Patch Management Best Practices

Right up there with human error, unpatched systems are one of the top causes of data breaches. According to the Ponemon Institute, over 57% of…

Read More

Best Practices for Cybersecurity Awareness Training Programs

Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention…

Read More

Best Practices for Cybersecurity Awareness Training Programs

Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention…

Read More

Avoid Becoming a Victim of Social Engineering

In any conversation regarding cybersecurity, the topic ultimately turns to phishing and the social engineering tactics that make this the most effective strategy for cybercriminals…

Read More

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

different kind of backups

The Pros and Cons of Different Kinds of Backups

If you’ve read our last blog on the importance of data backups, you are likely considering which kind of backup you should perform to keep…

Read More
next-gen security

Next-Gen Security Offerings – What Does It Mean?

The topography of threats for business organizations is rapidly evolving, and the stakes are rising higher as businesses become more reliant on remote access and…

Read More

Intimidation Tactics: Ransomware Cyber Gangs Now Call Their Victims

Cyber gangs use a number of tactics to intimidate their targets into paying their ransoms. Victims are often threatened or blackmailed via email into doing…

Read More

5 Reasons to Back Up Your Microsoft 365 Data

Many SMBs have moved to the cloud to take advantage of all the benefits that it can offer. A common misconception, however, is that the…

Read More

Password Management Solutions … Safe, Secure, and Simple to Use

With the cybersecurity incident first revealed by LastPass last August and updated a few weeks ago on December 22nd, questions have arisen on whether password…

Read More