October 26 2024
The Importance of Cyber Security
IT’S CYBERSECURITY AWARENESS MONTH: We’re kicking off our NEW Email Series on the Importance of Cybersecurity! Sign up below if you want to see Scout in your inbox more frequently. We’ll be sharing our firsthand experience with effective cyber security measures and how they relate to your business’s technological protection. To ensure your data is […]
Read MoreNovember 30 2023
Navigating the Evolving Landscape of Cybersecurity
Over the past decade, the IT/Managed Services Provider (MSP) industry has undergone a significant transformation, driven by the escalating importance of cybersecurity. This has been marked by a shift from traditional IT services to a more comprehensive approach with cybersecurity at the core of our offerings. Era of Transformation (2013-2023): Initial Focus on Infrastructure: Circa […]
Read MoreNovember 30 2023
Cyber Hygiene CDAP Assessment
Have you heard about the Canada Digital Adoption Program (CDAP) Grant? I’ve seen my fair share of spam about it; however, I hadn’t seen the value for us (or our clients) until I learned about Jelly Marketing’s CDAP assessment which was a great fit for us! Fast forward only a few weeks from my initial […]
Read MoreOctober 2 2020
Letter to our clients – October 2020 Improvementfest
The year 2020 isn’t even over yet, and it has been loaded with enough negative press for 2 years! I certainly struggled early in the year with finding the positive silver linings, but being the optimist that I am, I kept looking! We have all had many challenges to overcome this year, but take the […]
Read MoreJuly 13 2019
Protecting Against CEO Fraud
While most people would think twice about helping out a down on their luck Nigerian Prince, it’s a lot harder to dismiss an email that seems to be from your boss. This is what makes this type of phishing – commonly known as CEO Fraud – so effective. And it is not just CEOs. Any […]
Read MoreApril 26 2019
Two-Factor Authentication
Multi-factor authentication (MFA) is an authentication process in which a device user is granted access only after successfully presenting two or more pieces of evidence (factors) in authentication. Two-factor authentication (2FA), also known as two-step (2-step) verification, is a type of multi-factor authentication. Two-factor authentication is a method of confirming a user’s claimed identity […]
Read MoreApril 22 2019
Hard Drive Encryption
If you’re using a computer or a detachable USB, the chances are high you have sensitive data on these devices. Your personal finances are often on your desktop at home, your laptop at work may have confidential business information or, for James Bond, you have may have a thumb drive with government secrets stored on […]
Read MoreApril 17 2019
Supporting Senior Care With Technology
The Canadian population is ageing: by 2031, one in four people in B.C. will be over the age of 65. That translates to more than 1.3 million people. Care homes need to start positioning themselves now to handle the significant increase in the clientele by investing in infrastructure that will allow them to meet the […]
Read MoreApril 15 2019
Email Signature Solutions
In our previous blog post, The End of Emails, we discussed how technology has evolved to more collaborative self-organizing forms of communication. However, the reality is emails are here to stay, at least in terms of external corporate communication. Each day, the average office employee receives 121 emails and sends 40. In 2018 there were […]
Read MoreApril 11 2019
What Is Cloud Computing?
What Is Cloud Computing? By: Matt Dryfhout and Scott Hewer Cloud computing has become an area of interest for both large and small businesses over the past few years. Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local […]
Read More