Blog

September’s Free Online Microsoft Training

September’s Free Online Microsoft Training

Every month, we host Microsoft Office and other technology training sessions. Our training sessions are completely free of charge and are available “on-demand”.  Yes, you can tune-in whenever and wherever you like.   This month’s training session: 4 Ways To Use Microsoft Outlook Efficiently. Our in-house Microsoft training specialist, Dawn, will guide you through some very important...

read more
Beware of Third-Party Accessories

Beware of Third-Party Accessories

The Dangers of Purchasing Third-Party Computer Accessories Think all computer accessories and cables are safe? Think again! Learn how your next accessory purchase could expose your organization to hackers and threats.   Buying third-party accessories for computing devices can save money, but what if those purchases ended up being the cause of a cybersecurity attack and the...

read more
Happy Labour Day

Happy Labour Day

To make the most out of what we hope will be a gorgeous long weekend, we will be closing our office for the day on Monday, September 2nd. And as always, we’ll have technicians on call for all of our managed IT services clients, and you’ll be able to reach us by calling our office if any...

read more
The End Of Windows 7

The End Of Windows 7

As of January 14th, 2020, Microsoft will be ending all support for their hugely popular Windows 7 operating system, which has technology professionals strongly recommending businesses upgrade to Windows 10 in response. This brief video on the subject discusses what the end of Windows 7 support means for users and the risks that come with choosing not...

read more
How to Protect Your Business from SHTML Phishing

How to Protect Your Business from SHTML Phishing

Protecting Your Data from SHTML Phishing Data security is vital to any business. Learn how SHTML phishing works and how to minimize the risk of your data falling into the hands of attackers. Email phishing has been in the playbook of hackers since, well, email. What’s alarming is the scope in which criminals can conduct these attacks,...

read more
Capital One Data Breach Affects More Than 100 Million Customers

Capital One Data Breach Affects More Than 100 Million Customers

Capital One Data Breach Affects More Than 100 Million Customers and Small Businesses in The U.S. & 6 Million in Canada On July 29, 2019, Capital One reported that their customers’ confidential information was compromised. This includes the Social Security and bank account numbers of more than 100 million people and small & medium businesses in the U.S., along with...

read more
How To Download Audio From Facebook Messenger

How To Download Audio From Facebook Messenger

How To Download Audio From Facebook Messenger Facebook Messenger is one of the most popular chat and messaging services in the world. Increasingly, Facebook Messenger is increasingly being used to communicate using text, audio, and video. However, a common question asked by users of Facebook Messenger is how audio files can be saved from within the messages...

read more
OAuth Phishing Attacks: Threat Advisory

OAuth Phishing Attacks: Threat Advisory

What You Need To Know About OAuth Phishing Attacks Amnesty International has reported that OAuth Phishing attacks targeted dozens of Egyptian human rights defenders since the beginning of this year. They are warning that these human rights defenders should be vigilant and contact them if they receive any suspicious emails. “Since January 2019 several human rights defenders...

read more
Online Free Excel Training: Tips & Techniques For Managing Workbooks

Online Free Excel Training: Tips & Techniques For Managing Workbooks

Organization Shouldn’t Be Complicated Out of all of Microsoft’s Office programs, Excel is one of the most universally used. What started out as a fairly basic spreadsheet program has evolved into a must-have business tool. However, the more you use Excel, the more data your workbooks will accumulate. Keeping these workbooks organized and easy to navigate can...

read more
Top Ways to Avoid Phishing Scams (Including Spear Phishing)

Top Ways to Avoid Phishing Scams (Including Spear Phishing)

Phishing scams — and, increasingly, spear-phishing scams — are the number one way that cyber hackers gain access to closed computer systems, steal information and money, and corrupt data. Let’s take a look at what phishing and spear-phishing scams really are, how you can spot them, and how to help your organization avoid their highly detrimental consequences....

read more

Search Our Tech Insights

Are You Working With An Award-Winning Calgary IT Support Company?

403Tech is one of the Top 50 Managed IT services companies in Canada.

icon