Blog

What’s happening at Scout? Check out the most recent news, articles and upcoming events.

We’re Hiring a Systems Administrator

Scout Team

We are looking for a Systems Administrator to join our team! We are looking for someone who cares about doing things well, but also efficiently. Someone who wants to know how things work, enjoys solving problems, but also knows when to ask for help. Someone who sees the person behind the problem and who can build positive relationships […]

Read More

We’re Hiring a Network Administrator

Scout Team

Scout is a strong, growing provider of outsourced IT and Telephony services and support based in the Lower Mainland. Our purpose is to utilize technology to simplify lives, both for our clients and our team, so we are constantly learning and growing to best serve our clients. No two days are the same and we […]

Read More

Letter to our clients – October 2020 Improvementfest

The year 2020 isn’t even over yet, and it has been loaded with enough negative press for 2 years!  I certainly struggled early in the year with finding the positive silver linings, but being the optimist that I am, I kept looking! We have all had many challenges to overcome this year, but take the […]

Read More

Protecting Against CEO Fraud

Matt Dryfhout laughing with a group, holding a drink

While most people would think twice about helping out a down on their luck Nigerian Prince, it’s a lot harder to dismiss an email that seems to be from your boss. This is what makes this type of phishing – commonly known as CEO Fraud – so effective. And it is not just CEOs. Any […]

Read More

Two-Factor Authentication

Man typing on computer with mobile phone in his hand

Multi-factor authentication (MFA) is an authentication process in which a device user is granted access only after successfully presenting two or more pieces of evidence (factors) in authentication. Two-factor authentication (2FA), also known as two-step (2-step) verification, is a type of multi-factor authentication.   Two-factor authentication is a method of confirming a user’s claimed identity […]

Read More

Hard Drive Encryption

Multiple monitors with code on the screens and a pair of glasses in the forefront

If you’re using a computer or a detachable USB, the chances are high you have sensitive data on these devices.  Your personal finances are often on your desktop at home, your laptop at work may have confidential business information or, for James Bond, you have may have a thumb drive with government secrets stored on […]

Read More

Supporting Senior Care With Technology

Several senior care home buildings forming a village

The Canadian population is ageing: by 2031, one in four people in B.C. will be over the age of 65.  That translates to more than 1.3 million people. Care homes need to start positioning themselves now to handle the significant increase in the clientele by investing in infrastructure that will allow them to meet the […]

Read More

Email Signature Solutions

Person typing on laptop with email and user icons overtop

In our previous blog post, The End of Emails, we discussed how technology has evolved to more collaborative self-organizing forms of communication. However, the reality is emails are here to stay, at least in terms of external corporate communication. Each day, the average office employee receives 121 emails and sends 40. In 2018 there were […]

Read More

What Is Cloud Computing?

Man holding laptop with cloud over top

What Is Cloud Computing? By: Matt Dryfhout and Scott Hewer Cloud computing has become an area of interest for both large and small businesses over the past few years. Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local […]

Read More

Phishing Attacks

Earth over a blue background with a lock overtop

Globally, the threat from cyber attacks is increasing both in number and intensity. According to McKinsey & Company research, billions of data sets are breached annually, and each year hackers create roughly 120 million new variants of malware. Even with the growing awareness among businesses, they are frequently unprepared for the sophistication and ferocity of […]

Read More
1 2 3 4