Blog

How At-Risk is Your Corporate Computer Network Via Unprotected Devices?

How At-Risk is Your Corporate Computer Network Via Unprotected Devices?

When was the last time you performed a risk assessment of your computer network? Or evaluated the security of your personal, networked devices? An analysis of more than 212,000 Cisco networking devices at 350 organizations across North America found that 73 percent of businesses have end-of-life devices (those no longer being sold or supported) operating in their...

read more
On the Apple Update Regarding the Security Content of iOS 10.1

On the Apple Update Regarding the Security Content of iOS 10.1

Apple released a statement regarding the security content of iOS 10.1 on October 24 which breaks down the various security-flaw patches relating to Apple iOS 10 facets and apps the platform contains or works with.  The statement centers on Apple security updates and references the iPhone, iPad, or iPod versions the patches are available for, along with...

read more
What Is Your Backup and Recovery Policy?

What Is Your Backup and Recovery Policy?

These days, most of your business likely exists in a purely digital format. The software, applications, and data that make up the bulk of your daily tasks and interactions with clients are created and stored on computers and servers. This offers a level of organization and ease of access that lets your staff work efficiently, and keeps...

read more
New Ransomware Strain Posts Your Personal Information Online

New Ransomware Strain Posts Your Personal Information Online

Last month a new ransomware strain appeared called “Cry” or “CryLocker,” which uses PNG, or Portable Network Graphic image files to record target users’ information such as the encrypted files themselves, as well as their location, and then uploads an image of this data to an album on image-sharing sites such as Imgur.com. CryLocker was discovered by...

read more
A Quick Guide to Connecting to SharePoint Online

A Quick Guide to Connecting to SharePoint Online

Configuring a mapped network drive to connect to SharePoint Online is a quick and easy way to use Windows Explorer to drag files into libraries, create folders, move and copy files, and delete multiple files at the same time. There are a few steps you’ll need to go through to get SharePoint set up, and maintain the...

read more
Security Report: Is Your IT Partner Doing All They Can to Keep You Safe?

Security Report: Is Your IT Partner Doing All They Can to Keep You Safe?

When you speak to your IT partner, security is generally one of the first topics that will come up. And with good reason. If your business isn’t properly protected against outside threats, you stand to lose everything. Downtime doesn’t just result in a momentary loss of productivity; it often leads to a snowball effect that can cause...

read more
Hackers Can Spy and Take Screenshots with New Mac Virus

Hackers Can Spy and Take Screenshots with New Mac Virus

A recently-discovered virus targeting Mac computers is also being characterized as “backdoor spying software,” and which can covertly grab confidential data from computers, is codenamed “Mokes”. Discovered in January of this year by Stefan Orloff of Kaspersky Labs, Mokes was revealed to be a quite sophisticated cross-platform malware strain which also works on Linux and Windows operating...

read more
Yahoo Data Theft –A Good Reason to Regularly Change Passwords

Yahoo Data Theft –A Good Reason to Regularly Change Passwords

In case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the reason of the decade so far. The hack and subsequent data theft involving half a billion Yahoo accounts is the largest of its kind – ever. Granted, it is Yahoo, where most people don’t send...

read more
Cloud Security Risks Mostly Come from Employees

Cloud Security Risks Mostly Come from Employees

With the many companies and organizations moving a majority of their data networks to the cloud, there is an oft-overlooked and underestimated danger in the midst of the current exodus to cloud computing: risk of cyber security breach from within. And, while it’s not something CEOs or other executives want to face when busy with inherent IT...

read more
403Tech upgrades Logic NDT Solutions to a fully integrated IT system

403Tech upgrades Logic NDT Solutions to a fully integrated IT system

When Logic NDT Solutions approached them for help with their disparate IT systems, 403Tech set up a much more efficient IT structure allowing for company growth potential. 403Tech also resolved ongoing issues by providing continued support for email and website improvement.  Logic NDT Solutions Ltd. is an Alberta based company who are growing their services for the...

read more

Search Our Tech Insights

Are You Working With An Award-Winning Calgary IT Support Company?

403Tech is one of the Top 50 Managed IT services companies in Canada.

icon