If you use Microsoft Office 365 products at work or at home, you should be aware of the software’s extensive...
Do I Need Cyber Security Insurance?
Insurance Awareness Day offers an excellent opportunity to evaluate your company’s existing coverage. Make sure...
World Password Day Has Arrived. Here’s How You Should Celebrate It.
When was the last time you spent more than a few seconds thinking about your computer and Internet passwords? If...
Arming Business Owners in the Battle against Data Breach
PUBLIC SERVICE ANNOUNCEMENT – THURSDAY, MAY 5th 2016 A primary concern for any business is the protection of...
Why Every Business Needs a Continuity Plan
Anyone who runs a business should have his finger on the pulse of his organization. Yet even the most devoted...
Do YOU Know How to Create the Types of Strong Passwords That Will Keep You Safe?
In the world of cyber security, no topic is more important (or more derided) than that of passwords. Passwords...
Google Versus Microsoft: How Do Their Education Offerings Stack Up?
Teachers today have more ways than ever to engage students while also streamlining their classroom operations. It...
Why is the department of homeland security urging Windows users to uninstall QuickTime?
Apple announced last November that it would quit issuing security updates for the popular video program as ported...
What the Panama Papers Can Teach Us About IT Security
Over the past weeks, the Panama Papers have been all over the news. These documents shed light on how...
Microsoft OneDrive Spring Updates Include Compatibility With SharePoint
If your company uses Microsoft OneDrive for Business, you will be happy to know that it will have SharePoint...
Badlock Bug Poses Serious Security Risks
April 12, 2016 marks the day that the Badlock bug is slated to be released within the Windows and Samba...
CTECH Consulting Group Make ChannelE2E 100 List
Calgary IT Service experts join top managed services group. Calgary, Alberta – CTECH Consulting Group is pleased to announce...