Seven life-changing tech habits for 2020
IT Managed Service / IT Service Provider / IT services / Tech Habits /

Seven life-changing tech habits for 2020

Michael Anderson
By Michael Anderson 

Why not start 2020 with a resolution to incorporate tech habits to make you and your organization smarter and safer? Here are seven recommendations: 1. Be Suspicious of Unexpected Emails If you get an unusual-looking email, don’t open it. The goal of phishing emails is to gain information about you, steal your money, or install malware on your devices. For…

Our holiday donation supports Winnipeg’s Bear Clan Patrol
Bear Clan Patrol / Community / Holiday Donation / IT outsourcing / IT Service Provider / Winnipeg /

Our holiday donation supports Winnipeg’s Bear Clan Patrol

Michael Anderson
By Michael Anderson 

This year, 365 Technologies, on behalf of its clients, is making a holiday donation supporting Winnipeg’s Bear Clan Patrol. “With consciousness comes awareness, with awareness comes ownership of personal circumstances, and with collaboration comes change. It is within the context of this approach that the Bear Clan Patrol has been mobilized.” – Bear Clan Patrol website The patrol’s mission is…

Lessons from the Canva hack
Canva / cybersecurity / dark web / data breach / IT Managed Service / ZDnet /

Lessons from the Canva hack

Michael Anderson
By Michael Anderson 

We recently discovered one of our email addresses on the dark web following a hack of Canva, an Australian-based company that provides a simplified web design tool. In May, hackers breached Canva’s data, leaving approximately 139 million users’ data compromised, including names, usernames, email addresses, city, and country information. Although Canva has confirmed hackers didn’t access passwords, it still urged…

7 under-the-radar cybersecurity threats
cybersecurity / cyberthreats / hackers / IT Managed Service / IT outsourcing /

7 under-the-radar cybersecurity threats

Michael Anderson
By Michael Anderson 

Some cyberthreats get all the publicity. So, it’s great that Wired recently published an article about seven lesser-known cybersecurity threats that everyone should know about; true, they may not be as “newsworthy” as ransomware attacks and data breaches, but they can do serious damage to your data and privacy nonetheless. Read the full article here. Here is a summary of…

Meet Steffyann Bisnauth – Business Development Coordinator
IT Managed Service / IT outsourcing / New Employee Update / Steffyann Bisnauth /

Meet Steffyann Bisnauth – Business Development Coordinator

Michael Anderson
By Michael Anderson 

Steffyann is our new Business Development Coordinator. She has over 10 years’ experience in project- and relationship-management and account development. In her role, she’ll develop new business relationships, answer questions about 365 Technologies and its services, and guide new clients through the onboarding process. She’ll also represent and find new ways for 365 Technologies to work with local organizations to…

“The way we do things around here” – a guide to 365 Technologies’ culture
Cultural Guidelines / IT Managed Service / IT outsourcing / Work Culture /

“The way we do things around here” – a guide to 365 Technologies’ culture

Michael Anderson
By Michael Anderson 

“Culture” is the environment that surrounds you at work all the time. Simply put, it’s “the way we do things around here” at any business. At 365 Technologies, we believe it’s the key to our business, and (quite literally) the writing on the wall. Whenever we have visitors to our office or post pictures of our office online, people ask,…

Ransomware stats and facts
cyberattacks / cybersecurity / IT Managed Service / IT outsourcing / ransomware /

Ransomware stats and facts

Michael Anderson
By Michael Anderson 

When ransomware attacks, it can be costly in many ways. To understand the real impact of ransomware, we’ve summarized Comparitch’s article, “2017-2019 Ransomware statistics and facts.” When ransomware encrypts a computer file system it can cause irreversible data loss. Even more alarming, cybercriminals are increasingly using ransomware to freeze systems and extract money from their victims. Ransomware losses for businesses…

The age of 5G is upon us – but will it deliver?
5G technology / IT Managed Services / networks / wireless devices /

The age of 5G is upon us – but will it deliver?

Michael Anderson
By Michael Anderson 

Some are calling the advent and rollout of 5G the fourth industrial revolution. Can it possibly live up to the hype? Yes, 5G connectivity sounds pretty exciting. It promises a new era of cellular wireless networks and digital connectedness that includes faster mobile data access and better connectivity for your wireless devices. It could, in theory, mean downloading a two-hour…

Five ways to spot phishing email scams
cybersecurity / email scams / phishing / phishing attack /

Five ways to spot phishing email scams

Michael Anderson
By Michael Anderson 

Phishing email scams are getting sneaker and harder to recognize. Phishing is a fraudulent attempt to obtain sensitive information (such as usernames, passwords, or credit card details) by posing as a trustworthy entity or person in electronic communication. The fraudsters’ aim is to lure their victims into clicking malicious URLs or email attachments to get personal data. “Business email compromise…