Using Google Drive to Share Files with Clients

As a Google Workspace user, you have up to 2 Tb of space in your Google Drive. That’s more than most people can use in a lifetime. Of course you can use this to share documents with your clients, vendors, and partners. It’s really quite easy and in this short...

What’s Wrong with Your Phone?

If you’re still using a Plain Old Telephone System (or POTS) from Telus, maybe it’s time to consider a new technology. First of all, you’re probably paying more than you should. Plus you get a whole bunch of new features. For example, your POTS can’t: Send you a...

Atlas Announces its New Firewall Offerings

We looked long and hard at firewall options for our clients. Many were just too expensive to make sense for small and medium businesses. Many were more about hype than substance; if they had spent as much on their product as on their videos and marketing material,...

Do I Need a Firewall?

Here's a 4 minute video to explain what firewalls do and why they could make sense for you...

New Feature Supercharges Searches in Google Apps

Ever tried repeated searches for a specific email or file in Gmail or Drive? The results that Google returns aren’t always helpful. Wouldn’t it be nice if Google could learn from your past searches and better predict what you might want to find this time? Google...

What is Pen Testing?

Your corporate insurance broker might have recommended penetration testing, or "Pen Testing", as a cybersecurity strategy for your business. What is "Pen Testing"?To answer that question, think of your computer systems as a large building. Buildings have doorways....

What is Pen Testing? Is it Worth It?

Your corporate insurance broker might have recommended penetration testing, or "Pen Testing", as a cybersecurity strategy for your business. What is "Pen Testing"? To answer that question, think of your computer systems as a large building. Buildings have doorways....

Will Your Cyber Insurance Give You The Coverage You Need?

Last month, Lloyds of London announced that it would no longer honour cyber-insurance claims caused by "state based actors." This includes almost all ransomware attacks that have made the news this past year. As a major insurer worldwide, this will likely have a...

What is the Log4j Hack?

On December 9, cybercriminals began using a newly identified weakness in a commonly used system library called Log4J. You probably haven't heard of Log4J, nor should you. It is a library used to output log files so developers can solve problems. But the real problem...