Contact

(403) 488-3333

Team Cooking at the ronald mcdonald house medicine hat
28Jun

Cooking dinner at the Ronald McDonald House Charities (RMHC) Alberta

We had a fantastic and fulfilling evening with our team cooking for the families at the Ronald McDonald House Charities (RMHC) Alberta in Medicine Hat.  The Ronald McDonald House Charity is a wonderful support available for families to help alleviate emotional, financial, and physical burdens when they need it most. Some of the staff at […]

Learn more
30Mar

Partek has achieved Sophos Gold Partner status! 🌟

Partek has achieved Sophos Gold Partner status! As cyber threats continue to grow in sophistication and frequency, we realize the importance and necessity of maintaining robust and comprehensive security solutions. Partek is committed to staying ahead of the curve for providing cutting-edge #cybersecurity solutions. Sophos is a global leader in cyber security solutions. As a Gold […]

Learn more
09Jan

Social Engineered Cyber Attacks

Social engineering is a prominent component of the overwhelming majority of recent cyber attacks. Whether the goal of a threat actor is to commit fraud, harvest credentials, or install malware, at some point a human being must be coerced into taking an action on the actors’ behalf. Cybercriminals continue to defraud, extort, and ransom companies […]

Learn more
05Dec

Define your Cybersecurity Risk

Cyber attackers target people, exploit people, and ultimately, they are people. Assessing your user vulnerability is an essential part of good cyber defence – you need to know who in your organization is most likely to fall for a well-crafted piece of social engineering.

Learn more
24Nov

Canadian food retail giant hit by ransomware

A wake-up call for Canada’s agri-food sector In a press release published Monday, November 7th 2022, Empire Co. revealed that while its grocery stores were still operational, some services were impacted by a company-wide IT issue. Empire Co. owns 1,500 stores across Canada, including Sobeys, Lawtons, IGA, Safeway, Foodland, Needs and other grocery outlets. “The Company’s grocery stores remain […]

Learn more
23Nov

‘Tis the season for cyber scams and festive phishing

Holiday Shopping Hazards Shopping online can save you time during the hectic holiday season, but it also comes with risk. While shopping scams happen year-round, cyber-attacks tend to surge during the holidays. It’s especially important during the holiday season to carefully examine any email that asks you to click a link, download a file, or […]

Learn more
20Nov

Cyber Security Brown Bag Business with the Medicine Hat Chamber of Commerce

Cyber Security Brown Bag Business Lunch Tuesday, November 29, 2022 12:00 PM – 1:00 PM At the Medicine Hat Chamber of Commerce413 6th Avenue SE, Medicine Hat, AB T1A 2S7 James Parsons, CEO of Partek, will present on the current cyber-security landscape and how it’s impacting Canadian small businesses. He’ll provide tips and education on how […]

Learn more
20Nov

Cyber Security Brown Bag Business

Cyber Security Brown Bag Business Lunch Tuesday, November 29, 2022 12:00 PM – 1:00 PM At the Medicine Hat Chamber of Commerce413 6th Avenue SE, Medicine Hat, AB T1A 2S7 James Parsons, CEO of Partek, will present on the current cyber-security landscape and how it’s impacting Canadian small businesses. He’ll provide tips and education on how […]

Learn more
26Oct

Cyber Security Awareness Month: Update your Software

Why software updates are important. Software updates are necessary to keep your computer, mobile devices, and tablets running smoothly – and software updates often lower security vulnerabilities as well. Cybercriminals are continuously coming up with new methods to steal information and gain access to private systems. Fortunately, there are some simple preventative measures that can […]

Learn more
21Oct

What is Phishing?

What is Phishing? “Phishing” can mean a handful of different things but generally encompasses all socially engineered email attacks, regardless of the specific malicious intent. Here are a few of the other terms we use throughout this report and how we define them: Bulk phishing: High volume, indiscriminate, “commodity” attacks in which the same fraudulent […]

Learn more
21Oct

Cyber Security Awareness Month: Multifactor Authentication

Staying safe online doesn’t have to be difficult. But with people at the heart of cyber attacks, user knowledge and awareness are key. To help you raise security awareness among your employees, Partek will be sharing a handful of free resources this month. Cyber attackers know that the people at your organization are your biggest […]

Learn more
11Oct

Cyber Security Awareness Month: Phishing

Don’t take the bait: Phishing Emails. Whether a large-scale invasion or a smaller targeted campaign, all successful phishing and email-based ransomware attacks are disruptive and damaging on some level. The simple reality is that they rely on human error. In order for cyberattacks to succeed, someone, somewhere, needs to take the bait. Cybercriminals utilize social […]

Learn more
07Oct

Cyber Security Awareness Month: Managing Passwords

Strong passwords: Greater security, minimal effort. You can buy a small padlock for less than a dollar—but you shouldn’t count on it to protect anything of value. A thief can pick a cheap lock without much effort, or simply break it. And yet, many people use similarly flimsy passwords to “lock up” their most valuable […]

Learn more
27Sep

Partek Achieves Blue Diamond Partner Status with Datto

Partek today announced it has achieved exclusive Blue Diamond partner status with Datto, the leading global provider of cloud-based software and technology solutions purpose-built for delivery by managed service providers (MSPs). Datto Blue Diamond status represents the top 2 percent of the company’s partners, worldwide. Partek has exceeded high standards of performance to qualify for Blue […]

Learn more
04Aug

What is a phishing email?

Do these Emails look Phishy? Phishing (pronounced: fishing) is an attack that attempts to steal money or data by getting you to reveal personal information on websites or through emails that pretend to be legitimate. Often requesting credit card or banking information, passwords, or login credentials.   The following are some common examples of Phishing […]

Learn more