IT Security Audits

Securing your network data begins with an IT security audit

Michael Anderson IT Best Practices, IT Managed Services, IT Security

The growing complexity of cloud services, data networks, and disaster-recovery backup services make comprehensive IT security audits a must for business owners – without an audit, your business may be at serious risk. Why your business needs an IT security audit: 1. Your data is more valuable than ever Malicious hacks and ransomware, such as Cryptolocker, cause downtime and are …

Protect Your PC

Protect your PC by doing these three, simple things

Michael Anderson IT Best Practices, IT Security

A couple of years ago, I wrote a post about how to keep your PC running in tip-top shape. These tips continue to be important to ensure your PC has a long life, so I’m reposting it today with some updates. Tip #1: Protect your PC with a surge protector Your home’s electrical outlets don’t provide a constant and consistent …

Three Dangers of Running an Unsupported Operating System

Michael Anderson IT Best Practices, IT Managed Services, IT Security, Software

“Nothing lasts forever.” – every IT professional Truer words were never spoken, as constant innovations in computers, software, and systems phase out older IT infrastructure. This can pose a problem for small- to medium-sized businesses with tight IT budgets. With limited funds, how do you keep a strategic IT technology plan to standards, yet provide your IT infrastructure with the …

12 Network Tests

12 Tests to Boost your Network Security

Michael Anderson IT Managed Services, IT Security

Network security not only protects your business’ data and systems, but makes it more efficient, organized, and profitable. Here are 12 tests you can perform to make sure your network security is as strong as it needs to be: 1. Network Layer Vulnerability Scanning: Uses a network layer Vulnerability Assessment (VA) scanner. Why use it? Vulnerability scanners identify security risks on every …

Ransomware Security

Five ways to protect your business from ransomware

Michael Anderson Disaster Recovery, IT Managed Services, IT Security

When it comes to cyberthreats, there is a lot to think about – from Trojan horses to worms. In 2017, ransomware attacks rose an astounding 250 per cent, according to AO Kaspersky Lab (2017): IT Threat Evolution Q1 2017. Ransomware is a type of malicious software that encrypts critical data on computers or mobile devices and blocks the owner from …


What’s a firewall and does my business need it?

Michael Anderson IT Best Practices, IT Security

“Block that score! Block that score! Zero yards, zero yards, not one more!” – old football cheer Just like a football team’s defense attempts to prevent the offence from scoring a touchdown, a firewall attempts to protect your network from unauthorized attempts to access your system, including hackers, viruses, and malicious code. A firewall can be hardware, software or both. …

cloud computing

The pros and cons of using the Cloud

Michael Anderson Cloud, IT Best Practices, IT Managed Services, IT Security

In my last blog,“What is the cloud?,” I discussed what the Cloud is and isn’t. In this post, I’ll discuss three advantages and disadvantages of using the Cloud. Cloud Advantages Lower hardware costs: You don’t have to purchase in-house servers. You use the provider’s hardware and only pay for what you need. Providers such as Microsoft Azure and Amazon Web …

Why you need Worry-Free IT™ – Managed IT Services

Michael Anderson IT Best Practices, IT Managed Services, IT Security

Pack up your IT troubles, and smile, smile, smile At 365 Technologies, we so believe in Worry-Free IT™, we own the trademark. What is Worry-Free IT™ and how can it help your business? Relax. Take a deep breath. And let’s break it down. Through our extensive experience, research and client meetings, we identified five major technology issues that all businesses …

Happy World Password Day – show your passwords some love!

Michael Anderson IT Best Practices, IT Security

Happy World Password Day – the day children run to the World Password tree to get their World Password presents from World Password Santa! OK, maybe not. However, it is worth considering – at least once a year – the degree to which your online password-safety and – security habits are holding up. According to the Netherlands-based security firm Gemalto, there were …

Baby, when the lights go out…will your data be safe?

Michael Anderson Disaster Recovery, Hardware, IT Security

When the power goes out, an Uninterruptable Power Supply, better known as a UPS, may be the difference between having a fully functioning office and one at a standstill; it can also save you and your employees time trying to clean up your data once the power is back. Typically, a UPS is used to protect hardware (computers, servers, and …