Posts about

IT security (8)

Ruckus Cloudpath: security for wired AND wireless networks

November 1, 2017

In recent years, IT experts have put a lot of emphasis on the importance of properly securing wireless networks. In fact, while the message has gone..

How to evaluate your risk in the event of a disaster in 22 questions

June 20, 2017

Most companies take measures to protect their IT data, and with good reason. However, the increasingly critical role of IT in business models tends..

How to prevent ransomware attacks using a test infrastructure

June 7, 2017

This article has been around for a while now. We invite you to consult our most recent blog articles here to be on the lookout for all the..

IT disasters: there is no such thing as “risk free,” but prevention is key!

May 25, 2017

These days, no company is safe from IT disasters. The causes are as many as they are varied. What with the damage of equipment, natural disasters,..

Are back-up copies still necessary for applications in the Cloud?

May 15, 2017

Analysts are unanimous. The future is cloud computing, public, with a private/hybrid emphasis depending on the size of the company. Indeed, the..

Business continuity in an era of rapid ransomware evolution

February 8, 2017

Ransomware is a category of malware whose purpose is to render the targeted data unusable or to block access to IT systems until a ransom is paid,..

How to overcome 3 fears related to IT managed services?

February 1, 2017

The rapid evolution of technology, especially everything related to mobility and digital transformation, has brought many challenges to companies. In..

5 priorities for Canadian IT executives in 2017

January 12, 2017

In 2017, companies will largely continue to invest in information technologies following a trend begun in 2012. According to the CIO Tech Poll study,..

IT security: 5 things you can do to secure your network perimeter

December 14, 2016

This article has been around for a while now. We invite you to consult our most recent blog articles here to be on the lookout for all the..

5 steps to implement the best practices for managing data access

December 8, 2016

Even though IT security is a daily struggle for SMBs, it is still usually underestimated. There are many simple actions can be done to avoid losing..