Technology is amazing when it works for us, but not so amazing when it doesn’t. New tech innovations have helped...
Office 365 Makes It Easy To IT-Enable the Processes You Need to Grow Your Business.
There’s no better solution for small and mid-sized businesses (SMBs) today than Microsoft Office 365. Why? ...
It’s Data Privacy Day… Do You Know Where Your Data Is?
If you’re not doing everything in your power to protect your data, you’re leaving your most valuable business...
We’re Proud to Introduce CTECH Version 3.0, Our Most Effective and Powerful Iteration Yet
What does this mean for our already established and loyal client base? It means, simply, that you will continue...
Cyberattacks: How to Prevent Online Terrorism
These days it seems like no one is safe from a cyber attack. Small businesses, however, are especially vulnerable...
Carl Fransen and CTECH: 16 Years Providing IT Support Calgary Businesses Depend On!
Carl Fransen Celebrates 16 Years Providing High-Quality, Trustworthy and Reliable Business IT Services Throughout...
Do You Know About This Compelling Grant Available for Canadian Businesses?
The Canadian Internet Registration Authority (CIRA), incorporated in 1998, is a member-driven not-for-profit...
Office 365 Helps You Comply with Up-to-Date Regulations and Standards.
Did you know that Microsoft Office 365 adheres to 10 rigorous privacy standards and compliance areas? This is...
When Is It Time To Think About Replacing My Aging Server?
Server hardware is the backbone of all that you do in your business. With the appropriate hardware, your company...
Thinning Out the Clouds: How CTECH Became a Microsoft Field Partner
Thinning Out the Clouds: How CTECH Became a Microsoft Field Partner CTECH Consulting Group Inc.’s President &...
Major Security Flaw Discovered In Intel Processors
Potentially every Intel processor sold in the last 10 years could have a critical security vulnerability that...
What You Need to Know About “Meltdown” and “Spectre.”
Two critical vulnerabilities were found in Intel chips that could result in a malicious attacker stealing your...