What’s Wrong with Your Phone?

If you’re still using a Plain Old Telephone System (or POTS) from Telus, maybe it’s time to consider a new technology. First of all, you’re probably paying more than you should. Plus you get a whole bunch of new features. For example, your POTS can’t: Send you a...

Atlas Announces its New Firewall Offerings

We looked long and hard at firewall options for our clients. Many were just too expensive to make sense for small and medium businesses. Many were more about hype than substance; if they had spent as much on their product as on their videos and marketing material,...

Do I Need a Firewall?

Here's a 4 minute video to explain what firewalls do and why they could make sense for you...

New Feature Supercharges Searches in Google Apps

Ever tried repeated searches for a specific email or file in Gmail or Drive? The results that Google returns aren’t always helpful. Wouldn’t it be nice if Google could learn from your past searches and better predict what you might want to find this time? Google...

What is Pen Testing?

Your corporate insurance broker might have recommended penetration testing, or "Pen Testing", as a cybersecurity strategy for your business. What is "Pen Testing"?To answer that question, think of your computer systems as a large building. Buildings have doorways....

What is Pen Testing? Is it Worth It?

Your corporate insurance broker might have recommended penetration testing, or "Pen Testing", as a cybersecurity strategy for your business. What is "Pen Testing"? To answer that question, think of your computer systems as a large building. Buildings have doorways....

Will Your Cyber Insurance Give You The Coverage You Need?

Last month, Lloyds of London announced that it would no longer honour cyber-insurance claims caused by "state based actors." This includes almost all ransomware attacks that have made the news this past year. As a major insurer worldwide, this will likely have a...

What is the Log4j Hack?

On December 9, cybercriminals began using a newly identified weakness in a commonly used system library called Log4J. You probably haven't heard of Log4J, nor should you. It is a library used to output log files so developers can solve problems. But the real problem...

Why it’s Important to Sign your Emails

A Tale of Two Messages I sent out two identical messages that arrived in the receiver's mailbox. The first (the one on the left) ended up in the recipient's Junk E-mail folder. When the recipient opened it using Gmail on an Android phone, they saw a very concerning...