Last month PCM was recognized in an industry list that annually ranks the top managed service providers (MSPs) across the globe. For our third year in a row we were honoured by being ranked within the top 100 in the small business category! We’ve been working hard over the last few years refining our service offering and striving to give great support and expertise.
There are many essential pieces of software needed to keep the modern business running, with one of the most important being the antivirus scanner. These programs are a major component in keeping your systems and computers secure from the various Internet-based threats.
Take some time and research how companies are hacked and you will quickly come to realize that there are a wide variety of methods at a hackers disposal. One of the increasingly common, and effective strategies being employed is spear phishing. In early December 2014, a new spear phishing attack was uncovered, one that has proven to be quite effective against large businesses, and could possibly target small companies as well.
With a Disaster Recovery Plan and Business Continuity Plan, businesses need to ensure that a proper data and system backup solution is in place. There are many different ways to implement a backup solution, with one of the most common being online or cloud-based backup.
As we approach the end of another year we wanted to take a moment and send season’s greetings from all of us. Wishing you and your loved ones a Merry Christmas and all the best in the coming year. Ed & Henrietta VanderLaan, Adrian VanderLaan and staff: Pattie Atherton, Maurice Brink, Mark Kottelenberg, Alvar Vandenbeukel, Rob VanderLaan and David VanderMeulen.
Cloud solutions have become an integral part of many businesses. If you are looking to implement a new cloud solution, one of the best places to start is with Microsoft’s Office 365. This business-oriented platform has a lot to offer users, however, as with all other Microsoft products, there are a wealth of plans to select from.
When first introduced, email was viewed simply as an electronic version of memos and business letters, and were usually formatted thus. Over time, email has become much more informal, leading to a more natural form of communication. While this is great, there can be times when emails come across as unstructured and unclear, leading to frustration and even a loss of productivity.
The end of the year can be a stressful time for all. Businesses are busy preparing to finish the year and are usually tied up planning for the year ahead. This often means looking for new, yet affordable, business systems that can make tasks and business operations easier.
This year, as in recent years, one of the hottest gifts for the holiday season is the iPad. If you receive a brand new iPad for the first time then that is truly an awesome present, but you may already have one. If you do, then you may not be able to install apps on your new device at first because your iTunes account already has other devices linked to it.
While there are many different types of malware out there, the good news is that with many threats we know where they come from and their purpose. Recently, news broke of a new form of malware called Regin that is causing quite a stir in the security community, largely because it’s tough to deal with and not much is actually known about it.