Latest News

Creating Your Incident Response Plan 

In a previous article we wrote about the activities and information required to create an effective incident response plan. In this article we will talk…

Read More

Preparing to Create Your Incident Response Plan

Often, when we consider creating incident response plans, we have cyber incidents in mind. This is not surprising, given the ever-increasing frequency of cyber attacks…

Read More

Best Practices for Cybersecurity Awareness Training Programs

Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention…

Read More

Avoid Becoming a Victim of Social Engineering

In any conversation regarding cybersecurity, the topic ultimately turns to phishing and the social engineering tactics that make this the most effective strategy for cybercriminals…

Read More

To Pay or Not to Pay: That is the Question That Ransomware Victims Must Answer

Most people never heard of the Colonial Pipeline Company before May 2021, even though it transports 45% of all fuel consumed on the US East…

Read More

Preparing for Compliance to the Modernization of Privacy Laws in Canada

With all the different legislation either already enacted or being enacted in different jurisdictions, organizations may find it difficult to determine what they need to…

Read More

Have you Heard About the Cybersecurity Onion?

Cybersecurity continues to be a top concern for businesses in Canada. This is not a surprise. In 2021, 85.7% of Canadian organizations experienced at least…

Read More

The Modernization of Privacy Laws and What This Means for Your Business

In a digital world where personal information is so easily collected and may easily be used for malicious intent, concerns about privacy and the protection…

Read More

How to Prepare for Disruptions Caused by Cloud Service Outages

You don’t have to look very hard to find examples of cloud service outages. In June of last year, a huge cloud service outage caused…

Read More

Why Collaboration Data Needs to be Backed Up

In today’s business environment, the majority of collaboration content is acted upon and stored electronically in Software as a Service (SaaS) applications such as M365….

Read More

5 Reasons to Back Up Your Microsoft 365 Data

Many SMBs have moved to the cloud to take advantage of all the benefits that it can offer. A common misconception, however, is that the…

Read More

What is the Difference Between Cloud Storage and Cloud Backup?

The cloud has become more pervasive in the last few years and in particular, the last two years. It has certainly helped businesses with their…

Read More

Why IT Will Cost More in 2022

In a previous blog this month, we talked about planning your IT budget and investments for 2022. In this blog, we will dig a little…

Read More

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

How to Develop a Sound Enterprise Content Management Strategy

Enterprise Content Management (ECM) is a way to store and organize data within an organization. The data may include documents and any other content that…

Read More

How to prepare for Microsoft Server & SQL Server 2008 end of life

As you might already know, extended support for Microsoft SQL Server 2008 and SQL Server 2008 R2 is ending on July 9th. 2019. With the…

Read More
Etiquette Video Conferencing

Online Etiquette to Follow During Video Conferences

Technology has been a blessing during this challenging global health pandemic. Even though physical gatherings and meetings are not allowed and may have health repercussions,…

Read More

Have You Considered Device-as-a-Service?

This past year has brought with it many changes and many learnings. The word “transformation” has become one of the most used, or some would…

Read More

Avoid Becoming a Victim of Social Engineering

In any conversation regarding cybersecurity, the topic ultimately turns to phishing and the social engineering tactics that make this the most effective strategy for cybercriminals…

Read More