Testing Your Data Backups

  I was talking to a potential client who was having issues with their VOIP phone system. There seemed to be confusion on whether the data for the phone system was backed up. The client wanted to expand their network but needed confirmation from their IT people who were having trouble confirming the information. There should be no “confusion” or question. Testing your data backups More »

Remote Monitoring

One of the services that we provide our clients under a Managed Services Plan (MSP) is remote monitoring of components in their system. The reason our clients choose to be on a MSP is to keep the computer system running efficiently at all times. This is achieved by defined periods of maintenance and by detecting problems before they create downtime. One way we keep a More »

Deleting Data Permanently

No this is not an ad for a new video game but it would be a great movie title! I want to highlight our process of deleting data permanently off storage devices. Why should you care? Data on storage devices can be recovered even if deleted. The normal delete process does not actually remove any data, just the pointer to the data*, as a result, More »

Texting Cyber Attacks

Recently, we have seen a number of text messages come across our mobile phones that, if opened, can create problems for you. Example #1 “Hi, it’s Fido: You’ve been refunded 10.15$ due to an overcharge on your last bill. Click here to claim your funds: interafund.info/interac/” Notice that the $ sign is behind the dollar amount instead of in front. Example #2: “A purchase has More »

Newsletter

Here is our May 2018 Newsletter: Well, it looks like spring has finally sprung!  We now have warmer and longer days, we all seem to have more energy and there is that sense of optimism and the desire to do ‘spring cleaning’. Sometimes that spring cleaning is getting out the BBQ or giving the car a good cleaning … we should also think of doing More »

Meltdown and Spectre

Widespread microprocessor flaws called Meltdown and Spectre have been recently identified. These vulnerabilities are related to the architecture of the processor ship installed in your computer.  These vulnerabilities allow hackers to potentially “observe” passwords and other sensitive personal data on computers It was discovered by Google several months ago. This affects owners of both Windows PCs and Apple Mac computers built with Intel, ARM and More »

Contact Us Now! Complete the form below or call 1- 800 263 3433

 

    Recent Comments
      Copyright © hsl.ca 2017-2019. All rights reserved.
      WP to LinkedIn Auto Publish Powered By : XYZScripts.com