Support

support@partek.ca

Contact

(403) 488-3333

Support

support@partek.ca

30May

Partek Achieves Silver Partner Status with Xerox

Partek progresses to Silver Partner status tier in Xerox Global Partner Program. The ever-changing world of print and print management, and the reliance on IT Service Providers to have a comprehensive portfolio of print solutions, required Partek to look for a dedicated partner for print solutions. In early 2022, Partek joined the Xerox Global Partner […]

Learn more
04Mar

How secure are your passwords?

Partek manages over 4,000 passwords for over 500 organizations through our asset management tools. Keeping access to our client’s critical assets secure and maintained. Every year, mainstream and tech media will report on the latest list of the “worst” passwords choices that everyday users make. And every year, I.T. Techs around the world cringe when […]

Learn more
14Feb

Why every business should own a domain name

First off, what is a domain name? In layman’s terms: A domain name is the address for a website. Just like a physical address helps people find a specific place, the purpose of a domain is to help visitors find a specific website. You type the website’s domain name into an internet browser URL bar […]

Learn more
24Jan

CISA urges organizations to strengthen their cybersecurity defenses

Last week, at least fifteen Ukrainian public institutions and government agencies’ websites were hacked and defaced by a new malware family Microsoft calls ‘WhisperGate’. Microsoft warns of the new malware family disguised as ransomware which is being used in attacks against multiple organizations in Ukraine. Since January 13th, Microsoft detected attacks that implement a destructive […]

Learn more
10Oct

How hackers use phishing emails in ransomware attacks

Phishing attacks work because people like to click on things. Hackers carefully tailor attacks to their victims by collecting publicly available personal information about them and playing to their sense of urgency to get a response. The attackers only need one person within your organization to click on the link or open an attachment. A […]

Learn more
06Oct

Windows 11 – What you need to know

Windows 11 releases on October 5th. Given that Windows 10 was already pretty polished when it launched, and only got better over time, why the need for a whole new version?  After testing early builds internally, it’s clear that Microsoft isn’t actually trying to fix much with Windows 11. It’s basically a fresh coat of […]

Learn more
26Sep

Are you at risk for a Cyber Attack?

6 best practices to secure your business You can’t go long without seeing another headline about a cyber-security breach impacting a high-profile company. In recent years, cybercriminals have gotten their hands on millions of social insurance numbers, passwords, company trade secrets, and more. Security breaches have increased 67% over the past five years and companies […]

Learn more
17Jul

Small / medium sized businesses are the most vulnerable to ransomware right now

For as much media attention ransomware is getting with large-scale cyber-attacks, it appears that many small and medium-sized businesses (SMBs) have failed to embrace the idea that they are ransomware targets. After all, why target an SMB when Fortune 500 companies have much deeper pockets? It appears when it comes to small businesses the sentiment […]

Learn more
10Mar

Phishing Emails Related to COVID-19 Vaccines on the Rise

Phishing campaigns that use the COVID-19 vaccination as bait are becoming more popular in recent months. In the same way that a year ago threat actors capitalized on the start of the global pandemic with coronavirus-related phishing attacks, cybercriminals are now trying to leverage the vaccine to steal money, credentials, and personal information. The FBI […]

Learn more
29Dec

5 Misconceptions about Cybersecurity and your Business

Cybersecurity is one of the hardest variables to control as an IT provider in a business environment, as user error becomes more prevalent across businesses everywhere. Unfortunately, many SMBs who work with managed service providers like Partek (MSPs) assume they are safe and protected and are therefore not taking proper precautions. As an IT professional […]

Learn more
01Dec

What is Business Email Compromise (BEC)?

What is Business Email Compromise (BEC)? Business email compromise (BEC), sometimes known as email account compromise (EAC), is one of the most financially damaging online crimes, and also one of the most common. It exploits the fact that so many of us rely on email to conduct business, both personal and professional. In a BEC […]

Learn more
19Oct

New Ransomware Variant Disguises itself as “Windows Update” attachment

Important Security Update: A well-known variant of Ransomware known as the ‘Emotet botnet‘ has changed the way it’s distributing its payload. Recent reports from the Cyber-security world indicate it has begun to use a new malicious attachment that pretends to be a message from Windows Update telling you to upgrade Microsoft Word. Emotet has been […]

Learn more
05Oct

Microsoft ends support for Office 2010: October 13th

There are still a significant amount of Office 2010 users out there, specifically within companies. As recently as 2017, according to a survey published by IT marketplace Spiceworks, Office 2010 was being used in 83 percent of the companies surveyed. However on October 13 that may change when Microsoft officially ends support for the Office […]

Learn more