(604) 200-2234

Warning: Foreign Hackers Compromised Citrix Systems

Citrix said the FBI warned them on Wednesday, March 6th that hackers compromised its IT systems and stole “business documents.” Citrix doesn’t know precisely which documents the hackers obtained nor how they got in. It’s suspected that this is a sophisticated cyber espionage campaign supported by a nation-state. The consequences of the Citrix security incident could affect a broader range of targets, as the company holds sensitive data for […]

What Is This Chromium Application That Just Appeared On My Computer?

Have you seen a new application — Chromium — suddenly appear on your computer? It’s likely that if you did not intentionally download it, the app is malware that should be removed immediately. While Chromium is a legitimate product, hackers have been using it to deliver adware and potentially unwanted programs, redirect browsers to different […]

Spring Forward This Sunday

Daylight Saving Time for 2019 starts on Sunday, March 10th. I’m sure you know how Daylight Saving Time (DST) works, but did you know not everyone in Canada observes this time change? Parts of British Columbia and Nunavut don’t observe DST, while a small part of eastern Ontario and most of Saskatchewan observes DST year […]

What are the Top Benefits Of IT Services To Local Small Business?

Why Do Local Small Businesses Need IT Services? Many small business owners are entrepreneurial and want to do as much as possible on their own. However, specific tasks require technical expertise that would distract owners from operating their businesses. IT support services are a perfect example of the type of task that small businesses owners […]

The Ultimate Small Business Owner’s Guide to Ransomware

Your employee innocently clicks a link within an email or visits a sketchy website and the next thing you know your digital assets are being held hostage by a cyber attacker. It only takes a few keystrokes to cause potentially irrevocable damage to your systems, and hackers are always looking for new victims. With ransomware, […]

Loading...