Present Blog – IT Thought Leadership

Why a Virtual Chief Information Officer (vCIO) is such a key element of Managed Services

Microsoft 365 Copilot: Your Ultimate Productivity Sidekick!

Why a Kickass Onboarding is so key to a successful Managed Services Integration

Why SMBs Are at the Forefront of Cyberattacks: Understanding Vulnerabilities and Mitigation Strategies

Present 2023 Blog Recap: Navigating Cybersecurity Challenges

Safeguarding Tomorrow: A look into the 2024 Cybersecurity Landscape

7 steps to Minimize Damage and Ensure Effective Recovery from a Cyberattack

Strengthening the Cybersecurity of SMBs with a Limited Budget: Interview with Our CISO, Michel Fecteau

Safeguarding Your Business: Understanding and Countering Cybersecurity Threats

Finding the Right Balance: How Much Should Your Company be Spending on its IT Budget?

When your wireless connectivity is putting your business at risk

Optimizing Operational Efficiency and Fostering Peace of Mind: Discussion with Maxime St-Jean, CEO of Santinel

Unraveling the Cyber Threat Landscape: Where Do Cyber Attacks Start?

7 Ways SMBs can Strengthen their IT Security

Boosting Business Agility & Customer Satisfaction: a chat with the founder of Partenaire-Conseils Financial Group

The Benefits of Cloud Computing For Your Business

Air Gap Backups: Enhance Your Cybersecurity Protection

The Benefits of Using a Password Manager for Enhanced Cybersecurity

How to Avoid Falling Victim to CEO Fraud Phishing Attacks

Why IT Managed Services are gaining in popularity?

What to do if Your Business Has Suffered a Cyber Attack?

Why Your Business Should Conduct IT Security Audits

Happy Holidays and warm wishes for 2023!

Why your SMB needs a security incident response plan?

Why Dark Web Scanning is a crucial element to a solid cybersecurity strategy

Cyber insurance and SMBs: Improve your security posture or lose your coverage

Cybersecurity Awareness Month: Interview with our CISO Michel Fecteau

Why does your SMB need cyber insurance?

How confident are you that you can identify a phishing scam?

Are you ready for Law 25 (aka Bill 64)?

A non-exhaustive guide to cybersecurity lingo

How to overcome the cybersecurity labor shortage?

Cybersecurity awareness is essential for your organization

Why you should adopt the Microsoft Modern Workspace

Summer: it's time for holidays and cyberattacks!

Crossware signature management solution : Make your marketing team happy with consistent, beautiful email signatures

Why it's so important to backup your M365 environment

Microsoft Teams Phone - What you need to know

Datto SIRIS: The All-In-One Managed Continuity Solution, with Native Immutability

Cybersecurity Culture: Allow your employees to be part of the solution, not the problem!

Multi-Factor Authentication: understand the risks, focus on quick wins, and act as soon as possible

Why a SOC-as-a-Service is essential for SMBs?

Bill 64: the hare, the tortoise and the ostrich.

How to recover from a Log4j attack?

Happy Holidays and warm wishes for 2022!

Don’t wait to protect your business from cyberattacks … learn from others

Interview with a Microsoft expert

The security of your business starts with an audit

Cyber Security First - Cyber Security Awareness Month 2021

Nutanix .NEXT 2021 Conference

Why it's time to break up with your antivirus and adopt an MDR service

EDR and SIEM: Two major allies in the protection of your data

Why and how to prevent your data from being sold on the Dark Web?

Top 5 reasons why so many SMBs are turning to IT managed services

Cybersecurity and Compliance in The Pharmaceutical Industry

Why adopt a Zero Trust security model as soon as possible?

5 Deadly Myths on SMB Security

VeeamON 2021 at a glance

Think 2021- IBM all-in on hybrid cloud and AI

How to find the elusive IT unicorn

5 signs your business is ready for Managed Services

You Missed the Nutanix Economic Benefits Summit? Here are the highlights

Present just saved another client from a cyberattack

How to recover from a ransomware attack

Managed Services - An Asset during Spring Break

Backups are essential to defend against cybercrime

Top 3 technology trends businesses need to know about for 2021

Present's 5 Best Blog Posts of 2020

Happy Holidays and warm wishes for 2021!

The day we were hit by ransomware

Say goodbye to ransomware and ransom payments

Case study: Scaling up the remote workforce with secure connections

IBM Think 2020 made you stop and think!

Cybersecurity is not optional

Why the cloud has become essential for the growth of SMEs

Smarter Collaboration for the Workplace of the Future

Nutanix .Next 2020 - Review and announcements

We love what we do!

The Power of Multicloud

IT as a Business Contributor

VDI case study: an ideal solution for employees who work from home

Our website got a makeover!

A legal firm adopts Present’s data center modernization and IT managed services

Our 6 best tips for adapting to telework

How VDI Can Help In The Rise of COVID-19 Type Pandemics

Telework and Cybersecurity: what should companies know amid Covid-19

Foolproof strategies to retain your IT employees

4 Key points to demystifying the Cloud

Uncover Blockchain Before Your Competitors Do

3 key qualities of a great IT recruiter

When ransomware attacks backups

Why and how to prevent internal IT attacks

4 Reasons Why SMBs Need IBM Power i (AS/400) Servers

Nutanix .Next - Recap and Announcements

Migrating to the cloud: what is the cost of doing nothing?

Take advantage of all the benefits of Office 365 with personalized training

IT Recruitment: 5 reasons to do business with a specialized firm

IBM Think 2019: IBM combines data, AI and Cloud

Cloud security: a shared responsibility

PowerAI: harness the full potential of deep learning

Top 7 Corporate IT security New Year’s Resolutions !

Happy Holidays and warm wishes for 2019!

Implementation of Ruckus’ antenna technology: a case study of a Quebec company

Better IT Service Thanks to a Virtual CIO

What is the link between IoT, Big Data and artificial intelligence?

The Ruckus Big Dogs Conference: new Wi-Fi solutions, new challenges

Lenovo Transform 2.0: a rewarding experience on the future of IT and a major announcement

3 myths about Business Intelligence and SMBs

Business Intelligence (BI) and Business Analytics (BA): Key Tools for Using Your Data to Your Advantage

Office 365 IP Telephony: The Voice of the Future for Productive Enterprises!

Present Featured in Top 10 as Most Innovative Infrastructure Partner

Securing your customer data: 7 recommendations that every SMB should apply

AS/400 to Power Systems: 30 years of partnership with Present

AS/400 to Power Systems: 30 years of technological evolution

Quick-Anonymizer : protect your clients' data

SUSE Linux Enterprise Server for SAP Applications: the # 1 platform for SAP HANA

Bring your IT to the speed of your business with a software-defined data center

Managed Services: Get rid of the mental load and stress associated with IT operations

Migration to Office 365: A Case Study of a Multinational

4 Strategic Highlights of IBM Think 2018: blockchain, AI, cloud and security

Corporate culture: the driving force behind the success of Present

The New IBM Power9: A high performance server for today's and tomorrow's IT

Why deploy cloud backup as a service with Azure Backup 

IT Security : Survival Guide for Spectre and Meltdown 

Case study: Familiprix gears up for new projects with the help of SAP HANA on IBM Power

The spectre of vulnerabilities at the CPU level is now hovering over IT infrastructures

A look back at Present’s top blog posts from 2017

Best wishes for the holidays from the Present team!

9 common risk factors linked to an enterprise’s IT network

7 IT statistics that will blow your mind!

4 steps to transform IT into a business unit

Ruckus Cloudpath: security for wired AND wireless networks

Krack: WI-FI defect threatens to expose your data

6 reasons to entrust your Office 365 migration to a consultant

Hyperconvergence to the rescue of the traditional data center

Quick-SmartData, the AS/400 database replication solution

IT in SMBs: Technical assistance on demand VS managed services. Which to choose?

3 benefits of Software Defined Storage

5 responsibilities of IT leaders to overcome today’s challenges

2 major errors not to make with your IT

Why more and more business leaders are relying on IT managed services?

Microsoft Inspire: Digital transformation powered by collaboration

Recruitment decisions: What is the best option for IT needs, hire yourself or outsource?

5 reasons to use Azure: Microsoft's cloud offering

How to evaluate your risk in the event of a disaster in 22 questions

How to prevent ransomware attacks using a test infrastructure

How to simplify and optimize your IT asset management

IT disasters: there is no such thing as “risk free,” but prevention is key!

Are back-up copies still necessary for applications in the Cloud?

What’s new at Present? Three exciting announcements to share!

Office 365: an effective platform and not simply an email service

How to strengthen data security with tape storage

Present to provide the International Space Station with IT managed services

IT at the forefront to assist business leaders in achieving their goals

Flash storage (SSD) for production: Increasingly affordable advantages

CIO: How to demonstrate the business value of IT to management?

Business continuity in an era of rapid ransomware evolution

How to overcome 3 fears related to IT managed services?

Video: Transactions are 8x faster using SAP HANA on POWER8.

5 priorities for Canadian IT executives in 2017

A look back on 2016: 10 IT articles that marked the year

Transactions are 8x faster using SAP HANA on POWER8. (Video)

Happy holidays from the Present team!

IT security: 5 things you can do to secure your network perimeter

5 steps to implement the best practices for managing data access

3 things revealed by the top 2016 SMB IT priorities and challenges

6 qualities only excellent IT recruiting firms have

IT infrastructure: the differences between IaaS and traditional infrastructure

Computer security in SMBs: an often neglected daily challenge

The 6 key points of IBM Edge 2016, according to 3 Present experts

Wi-Fi in high-traffic public areas: a revolution is underway

What do you really buy with an IT Managed Services contract?

How to Adopt a 3-Phase IBM i Systems Modernization Strategy Now

Top 4 obstacles that keep you away from turning to IT managed services

Breqwatr: OpenStack solution to standardize cloud environments

3 pillars of your IT infrastructure that help create value-added data

6 of the best TED Talks to innovate with technology

High availability, more than just a disaster recovery solution

iOS 10 coming this fall: 3 changes companies must consider

Digital Transformation:  10 Latest Technology Trends in 2016

CEO, CFO, and CIO, all become winners when outsourcing IT

IT outsourcing for Quebec SMEs - 8 myths busted

SAP HANA on IBM Power: Canadian first performed by Present

RecoverPoint: accessible and reliable solution for disaster recovery

Solving Major Problems of Disaster Recovery Plans with the 3Rs

Do you have a plan to maintain IT Operations this summer?

5 key announcements made ​​at EMC World 2016 on the future of IT

4 trends influencing digital transformation in the insurance industry

Sales Assist: the mobile application for selling customized products

3 technologies for insurance companies improved performance

High availability on IBM system i simplified by Quick-EDD/HA

IBM Power Systems: 5 unsung strengths

5 essential tips to successfully implement Brocade

7 ways to keep Power servers at peak performance

9 obstacles in the way of digital transformation

4 keys to replicate data - based on your business needs

Leader in aerospace flies to new heights with managed IT services

Hush Pager optimizes internal communication with mobility

4 reasons to focus on improving your network infrastructure

Best practices for testing a high-availability environment