24 Hour Support Desk (905) 307-4357



MBC Blog

Insights on Industry, Technology and Trends



IT Maturity Model- Where Does Your Business Fit?

This entry was posted on by Yasmin Lasry.

Where Does Your Business Fit? IT Maturity is a company’s ability to stick to IT best practices. This, in turn, allows the companies to reap the most benefit from their IT initiatives.  The performance on the IT team closely resembles…

Sextortion Phishing Campaigns and How to avoid them

This entry was posted on by Yasmin Lasry.
Sextortion

Since late 2018, hackers have found yet another way to breach security at your expense. The latest that they’ve come up with is sextortion- or simply blackmail you into paying them money using your fears about your internet activities against…

Smart devices and Smart Businesses

This entry was posted on by Yasmin Lasry.

Smart devices have been making a buzz everywhere, from smart TVs to smart refrigerators, lights, blinds, etc. As the new norm in more and more aspects of our lives, smart homes are now filled with all sorts of gadgets powered…

Security Trends in 2019

This entry was posted on by Yasmin Lasry.

Cybersecurity issues have been making the news for a few years and we can expect significant breaches to occur even more often in the future. The further technology is pushed, with long lists of applications, devices and technological dependencies, the…

Business Changing IT Trends

This entry was posted on by Maria Kelebeev.

Business Changing IT Trends: While innovative technology is emerging almost daily, including AI, machine learning and blockchain, to name a few, as a small business owner such trends will have little or no effect on your business, unless you are…

5 Reasons to work with a Managed IT Services Provider

This entry was posted on by Maria Kelebeev.

When considering how to best enable your IT department, especially in a time of growth, businesses may not realize how much is at stake. With everything dependent on technology, whether it’s work stations, data storage, secure communications, internet access or…

Lessons from Entrepreneurs

This entry was posted on by Maria Kelebeev.
Entrepreneurs Show

MBC had the pleasure of attending the Toronto Entrepreneur Show. It was a day full of learning, exploring and networking catered for our core clients, small to medium-sized firms. In a presentation by Chris Baur, Vice President of Business Markets at…

Sizing up your IT needs

This entry was posted on by Maria Kelebeev.
Sizing-up your IT Needs

Let’s talk about sizing up your IT needs. Every company will need IT services, which will vary according to the firm’s size and stage. Companies may choose to fulfill their needs either in-house or by outsourcing help from a managed…

Lessons from the Google Cloud Summit

This entry was posted on by Maria Kelebeev.
Google Cloud Summit

On October 4, 2018, at the Enercare Center in Toronto, we had the opportunity to attend the Google Cloud Summit. It was a full day of learning what the latest cloud technology has to offer so that we can offer…

Vulnerability Assessments and Penetration Testing

This entry was posted on by Maria Kelebeev.
penetration testing

While the terms Vulnerability Assessments and Penetration Testing may be familiar and frequently used in security conversations, there is still some ambiguity about what they mean. Both play a vital role in a well-rounded security plan and vulnerability management, and…

MBC makes the list of Canada’s Fastest-Growing Companies

This entry was posted on by Maria Kelebeev.
MBC makes the list of  Canada’s Fastest-Growing Companies

MBC Managed IT Services Ranks on the 2018 Growth 500 of Canada’s Fastest-Growing Companies! – Canadian Business unveils 30th annual list of Canada’s Fastest-Growing Companies – Toronto (September 13, 2018) Canadian Business and Maclean’s today ranked MBC Managed IT Services…

Advance Threat Protection

This entry was posted on by Maria Kelebeev.
Advanced Thread Protection

In today’s cyber security landscape it is more important than ever to make sure to safe guard you systems. Advance Threat Protection protects your email, files, and Office 365 applications against unknown and sophisticated attacks. Microsoft Office 365 Advanced Threat Protection (ATP)…

Women in IT

This entry was posted on by Maria Kelebeev.
Celebrating Women in IT

While still relatively few in IT, women are gradually increasing in numbers and influence. To celebrate this growth and success, CDN and Ingram Micro Canada partnered to present the 8th annual CDN Women of the IT Channel Recognition luncheon on…

Innovation and Security

This entry was posted on by Maria Kelebeev.

Innovation and security might not seem as if they should be in conflict, but when creative steps forward open up new territories, they often also expose more vulnerabilities. So does this mean that in order to be secure, a growth…

Understanding IT Infrastructure

This entry was posted on by Maria Kelebeev.

Understanding IT infrastructure and what makes for a safe and efficient IT environment is the first step toward understanding what your business needs to keep running smoothly and safely. IT infrastructure is similar to city infrastructure, with its roads, highways,…

Phishing – What you need to look for

This entry was posted on by Maria Kelebeev.

Phishing is the fraudulent attempt to obtain your sensitive information. This includes info such as usernames and passwords to email accounts and credit card numbers. This is done by disguising as a trustworthy familiar contact and done via email. HOW…

Cyber Security Tips

This entry was posted on by Maria Kelebeev.

Cyber Security Tips: Cyber security is an issue for everyone to be concerned about. With technology woven into everything, it’s more important than ever to be careful about security. Here is a quick list of cyber security tips that are…

Selecting a Suitable Vendor

This entry was posted on by Maria Kelebeev.
Selecting a Suitable Vendor

Suitable Vendor: To ensure the wellbeing of your business, you might have to go through the process of selecting a suitable vendor more than once. As with in-house talent, the most successful vendor relationship results from a good match, which…

Infrastructure Automation

This entry was posted on by Maria Kelebeev.

Infrastructure Automation. At MBC, we have applied our knowledge and expertise to automation providing our clients with efficient error-free processes that can be continuously relied on. Current State: Your IT Environment Your infrastructure is key to making sure that everything…

100 Worst Passwords

This entry was posted on by Maria Kelebeev.
100 worst password

100 worst passwords as released by Spashdata every year. This is something that has been put out for the past seven years to bring awareness to the situation. While this gets some attention when it is released, we can all use…

News and Updates

Latest tweets from MBC:

What is the Difference between Layered Security and Defense in Depth? Click here to find out and learn which is the right one for your business. mbccs.com/difference-bet…

From MBC's Twitter via Twitter Web Client

Join our newsletter!