Shadow IT: What is it and how to discover and harness it 	 

Shadow IT: What is it and how to discover and harness it  

January 07, 2020

I have had the pleasure of leading IT departments in three different organizations. In the early days (the 1990s, 2000s) IT departments did it all. They built networks, installed the wiring, provided and managed servers, computers, and printers, email systems, and all the software applications. IT managed corporate applications such as HR, Payroll, and accounting systems. Shadow IT wasn't a thing back then other than perhaps the occasional person who had a family member in a computer store who could get them a great deal on a computer for less than the IT department could.

Read More
Busting Six Common Managed IT Services Myths

Busting Six Common Managed IT Services Myths

December 30, 2019

Managed IT Services are not a fable, yet there are a lot of fallacies and stories that can cloud your understanding of these services. This article aims to provide you with all the information you need if you are looking into outsourcing parts of your IT operations.

Read More
Why Businesses Need to Rethink Cyber Security as a Business Priority

Why Businesses Need to Rethink Cyber Security as a Business Priority

December 30, 2019

It happened again. On December 17, 2019, LifeLabs, Canada's largest private laboratory of diagnostic testing for health care announced that it had suffered a cyberattack that involved unauthorized access to their computer systems and which compromised the personal information of about 15 million customers, primarily in the provinces of British Columbia and Ontario. For businesses, this is just another reminder that cyber risk is everywhere and as cyber-attacks become the "new normal", it's high time to rethink their cybersecurity strategy.

Read More
All You Need to Know About Microsoft Power BI

All You Need to Know About Microsoft Power BI

December 20, 2019

Microsoft Power BI is a powerful business intelligence toolset that allows you to take control of your data and build visually appealing and interactive reports that can be accessed from anywhere. By harnessing the power of the cloud, users can take big data sets from various sources, express the data as a Power BI visual, and provide intelligent analytics insights.

Read More
10 Best Practices to Implement for Cybersecurity

10 Best Practices to Implement for Cybersecurity

December 11, 2019

Cybercrime is big business. The idea of a hacker working solo for the fun of the challenge has now been left in our digital past. The cyber attacks of today are often complex and backed by a staggering level of resources, including advanced hardware and software and a wide network of highly skilled cyber criminals. The traditional approach to cybersecurity – building stronger and better defenses to keep hackers and unauthorized individuals out ­– is no longer enough.

Read More
IT Budgeting in 2020: 11 Best Practices for Creating an Effective IT Budget

IT Budgeting in 2020: 11 Best Practices for Creating an Effective IT Budget

December 05, 2019

Budgeting is never easy – especially IT budgeting, which seems to be fraught with potential missteps and mistakes. But, how can you make such a complex and sometimes confusing task a little bit more manageable? Take a look at our eleven best practices for creating an effective IT budget in 2020.

Read More