365 Technologies: Blog
Welcome Aboard: Paul Shea, Business Development Manager
By Michael Anderson | November 17, 2017
It’s our pleasure to welcome Paul Shea, Business Development Manager, to 365 Technologies Inc. Paul started on Monday, Nov. 6, and has an extensive background in customer service, sales, and technology – in addition to being a world traveler. We are delighted to welcome Paul to the 365 Technologies family, and he and his family…
Read More → Minimize System Downtime Risk By Following these Simple Tips
By Michael Anderson | August 29, 2017
In the world of modern business, even short periods of downtime in critical IT infrastructure can seriously damage productivity. It’s estimated by experts at Gartner that, in a large business, a single hour of system downtime results in serious budget issues – costing companies up to $42,000! Because of this, it’s critical to follow network…
Read More → How IT Managed Services Makes Vendor Management A Breeze!
By Michael Anderson | August 22, 2017
If you’re the owner of a small business, and you don’t have an in-house IT department, chances are that you have to spend quite a bit of time managing vendors. Whether it’s for your networks, telecommunications infrastructure, or even things as simple as your photocopier and printer, managing these vendors can be a huge time-sink.…
Read More → The Top 5 Data Vulnerabilities in Your Company
By Michael Anderson | August 16, 2017
Despite the importance of IT security, many CEOs of small businesses are unaware of the primary data vulnerabilities in their company. However, to create a comprehensive backup and disaster recovery roadmap, it’s critical to understand where your data vulnerabilities lie. In this article, we’ll look at the 5 most common areas of data vulnerability, allowing…
Read More → 4 Ways to Protect Yourself from Ransomware
By Michael Anderson | June 26, 2017
Ransomware like Cryptolocker is a growing threat in the world of IT. Most recently, a ransomware attack known as “WannaCry” infected over 200,000 victims, using a hidden backdoor in systems that were running outdated versions of Windows. These ransomware attacks encrypt your company’s valuable files and hold them hostage until a ransom is paid –…
Read More → How to Choose the Right Managed IT Services Provider
By Michael Anderson | June 20, 2017
As the world of IT continues to grow more complex and expensive, more and more small-to-midsize businesses (SMBs) are turning to managed IT services providers to expand the capabilities of their IT teams. Though managed IT services are incredibly valuable, they can often appear to be expensive (especially relative to traditional ‘Break/Fix’ services). Before you…
Read More → 3 Critical Data Recovery Best Practices
By Michael Anderson | June 13, 2017
3 Critical Data Recovery Best Practices Your data is your company’s most valuable asset. So if you’re struck with a security breach, a breakdown of cloud services, or a ransomware attack like Cryptolocker, your data can be seriously affected – and your company may end up footing a huge bill for data recovery. However, the…
Read More → Email Safety Best Practices – How To Avoid Malware, Viruses, And More!
By Michael Anderson | May 9, 2017
Email. Love it or hate it, you have to use it. Even in 2017, there’s no replacement for email. It’s still the standard “de facto” communications method used by almost every company out there – and that’s unlikely to change anytime soon. That’s why it’s more important than ever to avoid malware, viruses, and ransomware…
Read More → The “S” in HTTPS is More Important Than You May Think
By Michael Anderson | January 19, 2017
It would be an understatement to say that security, particularly encryption, is important while browsing the web. Though it was only recently that encryption became a major pain point for government regulation, encryption has been around for a very long time. The average user can get a taste of online encryption through the average website…
Read More → Microsoft Outlook Users Should Be Wary of New Ransomware
By Michael Anderson | September 8, 2016
Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS (Distributed Denial of Service) attacks, which is…
Read More → Search for a topic
How can we help?
Whether you need immediate help with an IT issue or want to discuss your long-term IT strategy, our team is here to help.
Call us at (204) 336-6518 or complete the form below and we'll help in any way we can.