Blog

Computer with javascript code on screen

Endpoint Detection and Response (EDR) Security

Endpoint detection and response (EDR) security is becoming popular as a way to thwart ransomware attacks or other intrusions.

Ransomware attack on mac computer

Double Extortion Ransomware Attacks

In spite of the fact that ransomware has been around for decades, it continues to evolve. Contact us for a cybersecurity assessment at 403-266-5238.

DDoS attack or cyberattack in progress

What is a distributed denial-of-service (DDoS) attack?

Online visibility, sales, and security can be seriously affected by DDoS attacks. Call 403-266-5238 to get your website assessed today.

User of multiple devices for communication

Unified Communications as a Service (UCaaS)

To reduce costs and improve security, organizations of all sizes are switching to unified communications as a service.

Computer displaying code

Zero Trust: A Model for More Effective Security

Learn what zero trust is along with a history of the cybersecurity fundamental that has prevents billions of losses in digital assets.

cybersecurity analysis with glasses in front

How to Prepare your Business for Cyber Attacks Resulting from Russia Ukraine Crisis

After numerous warnings from regulators, is your team prepared for cyber attacks coming from the conflict?

One drive security assessment

Onedrive & Security Features Review

Leaving your valuable data in Onedrive exposes it to many vulnerabilities. We review one drive and analyze security features in this entry.