Contact

(403) 488-3333

07Feb

The optics of using free email as your business email

What email address do you use for your business? Does it end with @gmail.com, @outlook.com, @yahoo.com, or @hotmail.com?   There are inherent risks that should be enough to avert you from using a personal email account for business purposes. Personal email accounts exist outside of your I.T. companies control and they are not subject to […]

Learn more
27Jan

Microsoft issues critical Office 365 phishing warning

Microsoft 365 customers could be at risk. Microsoft has issued a warning on Twitter for users of its Office 365 service that a potentially malicious app called ‘Upgrade’ is going around to hundreds of its customers via consent phishing emails. Microsoft says the email asks for users to grant OAuth permissions to create inbox rules, […]

Learn more
24Jan

CISA urges organizations to strengthen their cybersecurity defenses

Last week, at least fifteen Ukrainian public institutions and government agencies’ websites were hacked and defaced by a new malware family Microsoft calls ‘WhisperGate’. Microsoft warns of the new malware family disguised as ransomware which is being used in attacks against multiple organizations in Ukraine. Since January 13th, Microsoft detected attacks that implement a destructive […]

Learn more
14Jan

Top Online Scams of 2021

Recent reporting from CTV News describes the top five scams that Canadians fell for in 2021 Even though many overseas scam boiler rooms and call centers closed down at the beginning of the pandemic, Canadians spent more time online or on social media, which made many people more vulnerable to investment fraud, romance scams, and […]

Learn more
10Oct

How hackers use phishing emails in ransomware attacks

Phishing attacks work because people like to click on things. Hackers carefully tailor attacks to their victims by collecting publicly available personal information about them and playing to their sense of urgency to get a response. The attackers only need one person within your organization to click on the link or open an attachment. A […]

Learn more
26Sep

Are you at risk for a Cyber Attack?

6 best practices to secure your business You can’t go long without seeing another headline about a cyber-security breach impacting a high-profile company. In recent years, cybercriminals have gotten their hands on millions of social insurance numbers, passwords, company trade secrets, and more. Security breaches have increased 67% over the past five years and companies […]

Learn more
17Jul

Small / medium sized businesses are the most vulnerable to ransomware right now

For as much media attention ransomware is getting with large-scale cyber-attacks, it appears that many small and medium-sized businesses (SMBs) have failed to embrace the idea that they are ransomware targets. After all, why target an SMB when Fortune 500 companies have much deeper pockets? It appears when it comes to small businesses the sentiment […]

Learn more
10Mar

Phishing Emails Related to COVID-19 Vaccines on the Rise

Phishing campaigns that use the COVID-19 vaccination as bait are becoming more popular in recent months. In the same way that a year ago threat actors capitalized on the start of the global pandemic with coronavirus-related phishing attacks, cybercriminals are now trying to leverage the vaccine to steal money, credentials, and personal information. The FBI […]

Learn more
29Dec

5 Misconceptions about Cybersecurity and your Business

Cybersecurity is one of the hardest variables to control as an IT provider in a business environment, as user error becomes more prevalent across businesses everywhere. Unfortunately, many SMBs who work with managed service providers like Partek (MSPs) assume they are safe and protected and are therefore not taking proper precautions. As an IT professional […]

Learn more
01Dec

What is Business Email Compromise (BEC)?

What is Business Email Compromise (BEC)? Business email compromise (BEC), sometimes known as email account compromise (EAC), is one of the most financially damaging online crimes, and also one of the most common. It exploits the fact that so many of us rely on email to conduct business, both personal and professional. In a BEC […]

Learn more
23Nov

Partek Supported Remote Access (WFH) Solutions

There are a variety of methods you can use to access your business I.T .systems remotely, however, not all of them are secure or provide the same level of security. Below is a list of best practices for remotely accessing your corporate I.T. systems if you are in a work from home situation: 1. Enforce […]

Learn more
19Oct

New Ransomware Variant Disguises itself as “Windows Update” attachment

Important Security Update: A well-known variant of Ransomware known as the ‘Emotet botnet‘ has changed the way it’s distributing its payload. Recent reports from the Cyber-security world indicate it has begun to use a new malicious attachment that pretends to be a message from Windows Update telling you to upgrade Microsoft Word. Emotet has been […]

Learn more
08Apr

COVID-19 Resources

To assist fellow business owners and executives, whether clients or not, we’ve put together the most relevant information to help navigate this unprecedented event from a business perspective. You’ll find resources on working remotely, avoiding COVID-19 based scams, and keeping your business operating during this crisis. We’ll continue to update the resources found on this […]

Learn more
01Mar

How Businesses Can Securely Work From Home

Setting Your Business up to Work from Home Securely (Note: This article is being updated constantly. Check back for more.) As the novel coronavirus (COVID-19) continues to spread, many businesses are assessing how they can prioritize their employee safety and still maintain regular business operations. One solution many businesses are turning to is recommending employees […]

Learn more
18Apr

Looking for Extra Support?

Your website generates leads, customers, and revenue. It’s a channel through which the world can discover and engage with your business. You want peace of mind that such a critical part of your business is functioning and accessible to your audience 24/7. It is important to stay on top of security, platform, plugin, and core […]

Learn more