How to evaluate your risk in the event of a disaster in 22 questions

Posted by Benoit Mercier_ on Jun 20, 2017 8:00:00 AM

Most companies take measures to protect their IT data, and with good reason. However, the increasingly critical role of IT in business models tends to increase the vulnerability of enterprises to disasters.

To help you evaluate your company’s risk level in event of a disaster, we have drawn up a questionnaire that addresses four areas related to IT security. This short survey will help you have a better idea of the consequences of a disaster on your operations, business, human resources, and your supply chain.

Answer the following questions and determine your risk level!

Read More

Topics: IT infrastructure, Disaster recovery (DR), CIO/IT leaders, IT security

How to prevent ransomware attacks using a test infrastructure

Posted by Francois Desjardins_ on Jun 7, 2017 7:45:00 AM

Ransomware attacks have become an important issue for companies over the last few years. Hackers use this type of malicious software to crypt the data of one or more computers and block companies from accessing their IT system. They then ask a ransom in exchange for the data.

 

A ransomware is a virus introduced into servers via email, a USB key, or any external component that can access a workstation or server. This can result in serious consequences for companies:

Read More

Topics: BYOD, IT infrastructure, CIO/IT leaders, IT security

IT disasters: there is no such thing as “risk free,” but prevention is key!

Posted by Francois Desjardins_ on May 25, 2017 10:00:03 AM

These days, no company is safe from IT disasters. The causes are as many as they are varied. What with the damage of equipment, natural disasters, outside provider service interruption, human errors, and computer abuse, it becomes rapidly clear that the concept of “risk free” does not exist.

 

Knowing that computer disasters lead to revenue losses of billions of dollars annually on a global level, it is in enterprises' best interest to understand the risks and adopt preventive and proactive solutions.

 

>>>Learn how you can protect your business assets with our free ebook<<<

Read More

Topics: IT infrastructure, Disaster recovery (DR), CIO/IT leaders, IT security

Are back-up copies still necessary for applications in the Cloud?

Posted by Claude Gagne_ on May 15, 2017 8:00:00 AM

Analysts are unanimous. The future is cloud computing, public, with a private/hybrid emphasis depending on the size of the company.

Indeed, the benefits of this cloud services approach are numerous and include more specifically:

•  Total cost reduction of possessing IT infrastructure by replacing outdated and at risk systems and applications

•  Faster implementation of business initiatives

•  Integration with existing infrastructures (hybrid cloud and back-up sites within the Cloud)

Read More

Topics: IT infrastructure, Cloud, IT security

Business continuity in an era of rapid ransomware evolution

Posted by Claude Gagne_ on Feb 8, 2017 8:00:00 AM

Ransomware is a category of malware whose purpose is to render the targeted data unusable or to block access to IT systems until a ransom is paid, generally in the form of hard to trace virtual money.

It can just as easily encrypt data from a work station as it can with what it has access to on a shared network.

 

 

A considerable threat

The 2016 Midyear Security Roundup: The Reign of Ransomware study demonstrates that throughout the first half of 2016 there was a 172% increase in cases of ransomware, in comparison to all of 2015.

Read More

Topics: IT Innovation, IT infrastructure, Disaster recovery (DR), Storage, IT security

How to overcome 3 fears related to IT managed services?

Posted by Benoit Mercier_ on Feb 1, 2017 7:30:00 AM

The rapid evolution of technology, especially everything related to mobility and digital transformation, has brought many challenges to companies.

In Quebec, as well as the rest of Canada, many companies are at a turning point: they must make critical decisions for their transformation and to secure their future. Choosing which functions to keep internally and which to outsource is part of these critical decisions.

While companies have outsourced IT management for many years, this practice has not yet fully become the norm, and it raises many concerns. [Read the free guide: The shift towards IT managed services. Why, how and is it right for you?]

Yet today, these fears are no longer justified. It’s important to note that the tools to ensure the monitoring and maintenance of IT infrastructures have improved greatly and the companies specialising in this service have optimised their business models and offerings.

Read More

Topics: IT infrastructure, Managed services, CIO/IT leaders, IT security

5 priorities for Canadian IT executives in 2017

Posted by Jennifer Bridgeman_ on Jan 12, 2017 10:10:00 AM

In 2017, companies will largely continue to invest in information technologies following a trend begun in 2012.

According to the CIO Tech Poll study, investments focus on two specific fields: analytics and security. CIO Adam Dennison said “Organizations continue to explore ways to conduct business smarter and protect assets and processes”.

 

In this context, we have identified 5 priorities for Canadian IT executives to position their projects in 2017 and to profit from IT.

Read More

Topics: IT infrastructure, Trends, Cloud, Digital transformation, CIO/IT leaders, IT security

IT security: 5 things you can do to secure your network perimeter

Posted by Claude Gagne_ on Dec 14, 2016 2:00:00 PM

Companies today must offer optimal data access to employees, customers, and partners in order to be efficient.

This requires continual Internet access, which exposes these companies to hostile environments where threats evolve rapidly.

Add to this the fact that employees can intentionally or involuntarily threaten the network by their actions, and you have everything you need for imminent disaster.

Read More

Topics: IT infrastructure, CIO/IT leaders, IT security

5 steps to implement the best practices for managing data access

Posted by Claude Gagne_ on Dec 8, 2016 3:00:00 PM

Even though information technology security is a daily struggle for SMBs, it is usually underestimated.

However, many simple actions can be done to avoid losing or corrupting data.

The first principle is to give only the strictly required access to each user to meet the 3 essential security principles of information systems:

 

  • •  Confidentiality: information is used only by authorized personnel;
  • •  Integrity: data cannot be modified accidentally or voluntarily;
  • •  Availability: the system must operate within the required levels of service.

 

However, in reality, for companies and, in particular SMBs, there are recurring problems.

 

Read More

Topics: IT infrastructure, CIO/IT leaders, IT security

About this blog

The right use of technology addresses business challenges and drives business growth in all areas of an enterprise.  We hope this blog will offer insight into developing strategies and tactics to enable you to identify those key drivers of growth and keep pace with and anticipate the rapid technology change of today.

Subscribe to Blog Updates by email

Protecting your business assets: Lower your risks with a disaster recovery plan