2015 was a blockbuster year for mobile technology, bringing us a host of cool new innovations including 4K displays and curved phone screens, more useful and attractive smartwatches, and a broader range of devices that can access incredible speeds on…
Read more
My first post in this series covered the basics of distributed denial of service (DDoS) attacks: how they work, the different types of attacks and the areas of your IT infrastructure that can be targeted. Yet even when companies know…
Read more
I’ve always loved playing with gizmos and gadgets. I still remember popping a floppy disk into the desktop computer at school to play the Oregon Trail. It was a popular educational game (for those of you who are too young…
Read more
In recent years, wireless technology has evolved rapidly – progressing from 3G all the way to LTE as the mobile communications standard. And in recent months, global carriers – including Bell – have launched LTE Advanced. The latest evolution in…
Read more
If your business transports products or goods to customers, you’re likely familiar with the challenges that come with managing a fleet of drivers and vehicles. From balancing fuel expenses, and locating your trucks and cargo, to monitoring how many hours…
Read more
One of the primary complaints BlackBerry users have lodged over the years has centred around the lack of apps available on Blackberry devices when compared to other mobile platforms. And after much buzz and speculation, Blackberry has worked to solve…
Read more
Most of us are generally familiar with the infrastructure and capabilities of the public Internet. For most businesses, it’s a fundamental channel for communication, collaboration, customer engagement and more. But some business owners may not understand how a dedicated private…
Read more
Businesses across Canada have likely heard quite a bit about distributed denial of service (DDoS) attacks in the past year. The first three months of 2015 saw twice as many DDoS attacks as the same period the year before. Knowing…
Read more
When you’re ready to go home at the end of your working day, I have no doubt that you carefully lock up and secure your business’ premises and, in all likelihood, set your alarm system so it will detect any…
Read more
Protecting your company’s data involves more than putting it in a safe place and keeping it secure. Of course, you must keep it intact and be able to retrieve it in the event of an IT system failure, focused attack or unplanned event –…
Read more