Jessica Floresco, General Manager

365 Technologies teams up with Mother Earth Recycling

Michael Anderson 365 News, Culture, Green Technology, Hardware, IT Best Practices, IT Security

Our old hardware is going to a new home with a big heart 365 Technologies has teamed up with Mother Earth Recycling to recycle its old electronic equipment. “We usually recycle 200 to 300 computers a year,” says Michael Anderson, President and CEO of 365 Technologies. “This year, with Windows 7 support ending, that number will be closer to 400 to …

Gift Card Scam

Gift card scam uses boss’ email address

Michael Anderson IT Best Practices, IT Security

Sometimes it’s good to question the boss. If you get an email from your boss asking you to purchase gift cards, you may really be communicating with scammers. For the past six months or so, there’s been an email scam from “bosses” requesting that you purchase gift cards on their behalf. It’s a more sophisticated version of the traditional email …

Free Wi-Fi – Be Careful

Be careful about using public Wi-Fi

Michael Anderson IT Best Practices, IT Security

Would you like some free Wi-Fi with your coffee? Odds are, the last time you were at a coffee shop, you thought, “I’m paying for the coffee – I might as well use the free Wi-Fi.” There’s no doubt that Wireless Internet, or Wi-Fi, connections are everyone’s favourite free service. However, using free, public Wi-Fi is dangerous, especially for a …

IT Security Audits

Securing your network data begins with an IT security audit

Michael Anderson IT Best Practices, IT Managed Services, IT Security

The growing complexity of cloud services, data networks, and disaster-recovery backup services make comprehensive IT security audits a must for business owners – without an audit, your business may be at serious risk. Why your business needs an IT security audit: 1. Your data is more valuable than ever Malicious hacks and ransomware, such as Cryptolocker, cause downtime and are …

Protect Your PC

Protect your PC by doing these three, simple things

Michael Anderson IT Best Practices, IT Security

A couple of years ago, I wrote a post about how to keep your PC running in tip-top shape. These tips continue to be important to ensure your PC has a long life, so I’m reposting it today with some updates. Tip #1: Protect your PC with a surge protector Your home’s electrical outlets don’t provide a constant and consistent …

Three Dangers of Running an Unsupported Operating System

Michael Anderson IT Best Practices, IT Managed Services, IT Security, Software

“Nothing lasts forever.” – every IT professional Truer words were never spoken, as constant innovations in computers, software, and systems phase out older IT infrastructure. This can pose a problem for small- to medium-sized businesses with tight IT budgets. With limited funds, how do you keep a strategic IT technology plan to standards, yet provide your IT infrastructure with the …

12 Network Tests

12 Tests to Boost your Network Security

Michael Anderson IT Managed Services, IT Security

Network security not only protects your business’ data and systems, but makes it more efficient, organized, and profitable. Here are 12 tests you can perform to make sure your network security is as strong as it needs to be: 1. Network Layer Vulnerability Scanning: Uses a network layer Vulnerability Assessment (VA) scanner. Why use it? Vulnerability scanners identify security risks on every …

Ransomware Security

Five ways to protect your business from ransomware

Michael Anderson Disaster Recovery, IT Managed Services, IT Security

When it comes to cyberthreats, there is a lot to think about – from Trojan horses to worms. In 2017, ransomware attacks rose an astounding 250 per cent, according to AO Kaspersky Lab (2017): IT Threat Evolution Q1 2017. Ransomware is a type of malicious software that encrypts critical data on computers or mobile devices and blocks the owner from …

Firewall

What’s a firewall and does my business need it?

Michael Anderson IT Best Practices, IT Security

“Block that score! Block that score! Zero yards, zero yards, not one more!” – old football cheer Just like a football team’s defense attempts to prevent the offence from scoring a touchdown, a firewall attempts to protect your network from unauthorized attempts to access your system, including hackers, viruses, and malicious code. A firewall can be hardware, software or both. …

cloud computing

The pros and cons of using the Cloud

Michael Anderson Cloud, IT Best Practices, IT Managed Services, IT Security

In my last blog,“What is the cloud?,” I discussed what the Cloud is and isn’t. In this post, I’ll discuss three advantages and disadvantages of using the Cloud. Cloud Advantages Lower hardware costs: You don’t have to purchase in-house servers. You use the provider’s hardware and only pay for what you need. Providers such as Microsoft Azure and Amazon Web …