Contact

(403) 488-3333

EBT accountants
29Aug

Customer Success Story: EBT Chartered Professional Accountants

Chartered Accounting Firm 120+ Employees ebtca.com Key Outcomes: Medicine Hat’s elite accounting firm improves operational reliability with virtualized desktop infrastructure (VDI). As a fast-growing accounting firm, servicing clients of all sizes, EBT required an infrastructure that could keep up with its growing organization.  Using an outdated Remote Desktop Services (RDS) environment was causing challenges which […]

Learn more
Google on laptop screen
11May

The basics of browsing safely.

The basics of browsing safely. We use the internet for almost everything these days; from checking email, reading the latest news, to staying in touch with friends. Using the Internet is routine and comfortable, even so, surfing the web can pose certain risks.  The Internet is an ever-changing landscape. New webpages pop up daily, with […]

Learn more
sun city ford
07Mar

Customer Success Story: Sun City Ford

Car Dealership suncityford.ca Key Outcomes: Transforming Medicine Hat’s premier Ford dealership with Partek 360 Managed IT Services. The last few years have had a radical impact on the car dealership industry. From supply-chain issues, to unprecedented demand, dealerships have had to adapt to these challenges with a technology-first mindset.  Sun City ford was utilizing a […]

Learn more
09Jan

Social Engineered Cyber Attacks

Social engineering is a prominent component of the overwhelming majority of recent cyber attacks. Whether the goal of a threat actor is to commit fraud, harvest credentials, or install malware, at some point a human being must be coerced into taking an action on the actors’ behalf. Cybercriminals continue to defraud, extort, and ransom companies […]

Learn more
05Dec

Define your Cybersecurity Risk

Cyber attackers target people, exploit people, and ultimately, they are people. Assessing your user vulnerability is an essential part of good cyber defence – you need to know who in your organization is most likely to fall for a well-crafted piece of social engineering.

Learn more
24Nov

Canadian food retail giant hit by ransomware

A wake-up call for Canada’s agri-food sector In a press release published Monday, November 7th 2022, Empire Co. revealed that while its grocery stores were still operational, some services were impacted by a company-wide IT issue. Empire Co. owns 1,500 stores across Canada, including Sobeys, Lawtons, IGA, Safeway, Foodland, Needs and other grocery outlets. “The Company’s grocery stores remain […]

Learn more
23Nov

‘Tis the season for cyber scams and festive phishing

Holiday Shopping Hazards Shopping online can save you time during the hectic holiday season, but it also comes with risk. While shopping scams happen year-round, cyber-attacks tend to surge during the holidays. It’s especially important during the holiday season to carefully examine any email that asks you to click a link, download a file, or […]

Learn more
20Nov

Cyber Security Brown Bag Business

Cyber Security Brown Bag Business Lunch Tuesday, November 29, 2022 12:00 PM – 1:00 PM At the Medicine Hat Chamber of Commerce413 6th Avenue SE, Medicine Hat, AB T1A 2S7 James Parsons, CEO of Partek, will present on the current cyber-security landscape and how it’s impacting Canadian small businesses. He’ll provide tips and education on how […]

Learn more
20Nov

Cyber Security Brown Bag Business with the Medicine Hat Chamber of Commerce

Cyber Security Brown Bag Business Lunch Tuesday, November 29, 2022 12:00 PM – 1:00 PM At the Medicine Hat Chamber of Commerce413 6th Avenue SE, Medicine Hat, AB T1A 2S7 James Parsons, CEO of Partek, will present on the current cyber-security landscape and how it’s impacting Canadian small businesses. He’ll provide tips and education on how […]

Learn more
21Oct

What is Phishing?

What is Phishing? “Phishing” can mean a handful of different things but generally encompasses all socially engineered email attacks, regardless of the specific malicious intent. Here are a few of the other terms we use throughout this report and how we define them: Bulk phishing: High volume, indiscriminate, “commodity” attacks in which the same fraudulent […]

Learn more
27Sep

Partek Achieves Blue Diamond Partner Status with Datto

Partek today announced it has achieved exclusive Blue Diamond partner status with Datto, the leading global provider of cloud-based software and technology solutions purpose-built for delivery by managed service providers (MSPs). Datto Blue Diamond status represents the top 2 percent of the company’s partners, worldwide. Partek has exceeded high standards of performance to qualify for Blue […]

Learn more
04Aug

What is a phishing email?

Do these Emails look Phishy? Phishing (pronounced: fishing) is an attack that attempts to steal money or data by getting you to reveal personal information on websites or through emails that pretend to be legitimate. Often requesting credit card or banking information, passwords, or login credentials.   The following are some common examples of Phishing […]

Learn more
24Jun

How to detect a phishing email?

With the recent increase in Ransomeware infections instigated through phishing emails, it is critical to take proactive measures to protect yourself and your organization’s security. Vigilance in detecting phishing emails and educating your employees to be proactive and recognize risk is a crucial step in protecting your organization. Don’t trust the display name Just because […]

Learn more