Software Assurance Changes Anxiety? Relax, We've Got You Covered

Software Assurance Changes Anxiety? Relax, We've Got You Covered

October 18, 2019

Last September, Microsoft announced some changes to Software Assurance, its software licensing program. As a customer, you might be wondering how these changes will impact you? Relax, Softlanding did the grunt work to help you navigate through those changes.

Read More
6 Tricks to Help You Prevent Phishing Attacks

6 Tricks to Help You Prevent Phishing Attacks

October 21, 2019

Phishing is not a new issue but is certainly one of the most dangerous methods of cyber crime that keeps on plaguing individuals and businesses. Since these attacks are getting increasingly more frequent and sophisticated, it is key that end-users learn how to recognize phishing attacks and understand how to react when they happen. To help you prevent phishing attacks and spread the words on security, we've put together 6 tricks to help your end-users spot these attacks.

Read More
Azure vs AWS vs Google Cloud: Which Cloud Platform is Best for Your Business?

Azure vs AWS vs Google Cloud: Which Cloud Platform is Best for Your Business?

October 25, 2019

Currently, there is a significant competition by the three leading cloud providers: Microsoft Azure, Amazon Web Services (AWS) and Google Cloud Platform (GCP). In this article, you are going to learn more about these cloud vendors including their features, differences, comparison to help you choose the right cloud platform for your business.

Read More
Public Cloud and Canadian Data Residency: What Has Changed for BC Public Sector?

Public Cloud and Canadian Data Residency: What Has Changed for BC Public Sector?

November 04, 2019

Cloud technology is rapidly transforming IT departments and also how whole organizations operate, communicate and do business. This major shift will impact all parts of the Canadian economy. However, Canada does not have national consistent data residency laws and a couple of provinces such as British Columbia dictate that government data should reside in Canada. Changes to the BC FOIPPA legislation last month may, at last, unlock the power of the cloud for BC public sector bodies in a meaningful way. 

Read More
Is Zero Trust the Ultimate Security Model?

Is Zero Trust the Ultimate Security Model?

November 04, 2019

The Zero Trust Network or Zero Trust Architecture is not a new solution or a new product. It is a cybersecurity framework that includes different technologies, processes, and strategies all focused on identity verification. In this article, we'll explain what it is, how it works and why you should consider it as your next security move.

Read More
5 Steps for a Smooth Cloud Migration Journey

5 Steps for a Smooth Cloud Migration Journey

November 04, 2019

Moving to the cloud is no longer an option. The cloud has gone from a 'nice to have' to a 'must-have' to enable innovation, efficiency, agility and cost reduction within organizations. Easier said than done. While cloud adoption is accelerating, many businesses struggle to structure their cloud transformation and plan a successful migration on budget and time.

Read More
How to Approach Digital Transformation for the Next Decade

How to Approach Digital Transformation for the Next Decade

November 14, 2019

Across the country and from industry to industry, digital transformation is the new buzzword and is often high up on the agenda when C-suite executives get together. These execs understand how important it is to keep ahead of any digital developments so that they can maintain a competitive advantage, although they may not always be able to see a clear path forward when it comes to integration.

Read More
Why You Can No Longer Ignore Backup and Disaster Recovery

Why You Can No Longer Ignore Backup and Disaster Recovery

November 19, 2019

Your business relies every day on critical data, applications, and operations. What would you do if these things were suddenly interrupted or lost? No matter the size of your business, when your systems stop working, so do your business and employees. And this can put your business at risk.

Read More
How Microsoft is Shaping the Future of Multi-Cloud Environments

How Microsoft is Shaping the Future of Multi-Cloud Environments

November 25, 2019

The cloud computing landscape is evolving rapidly and one of the key technology trends that will shape 2020 will be multi-cloud environments. Even though many enterprises are already running on multi-cloud environments, they struggle to manage them especially when it comes to moving application workloads, servers and containers from one environment to another. 

Read More
The Benefits of Partnering With an IT Managed Service Provider

The Benefits of Partnering With an IT Managed Service Provider

December 05, 2019

Managed services have been growing over the past few years and are not expected to slow down anytime soon. This market is projected to grow to $900B by 2023, i.e. 13% of the IT market in North America according to a recent report by ResearchAndMarkets.com.   So, why are so many businesses making the move?

Read More
IT Budgeting in 2020: 11 Best Practices for Creating an Effective IT Budget

IT Budgeting in 2020: 11 Best Practices for Creating an Effective IT Budget

December 05, 2019

Budgeting is never easy – especially IT budgeting, which seems to be fraught with potential missteps and mistakes. But, how can you make such a complex and sometimes confusing task a little bit more manageable? Take a look at our eleven best practices for creating an effective IT budget in 2020.

Read More
10 Best Practices to Implement for Cybersecurity

10 Best Practices to Implement for Cybersecurity

December 11, 2019

Cybercrime is big business. The idea of a hacker working solo for the fun of the challenge has now been left in our digital past. The cyber attacks of today are often complex and backed by a staggering level of resources, including advanced hardware and software and a wide network of highly skilled cyber criminals. The traditional approach to cybersecurity – building stronger and better defenses to keep hackers and unauthorized individuals out ­– is no longer enough.

Read More