24 Hour Support Desk (905) 307-4357



MBC Blog

Insights on Industry, Technology and Trends



Why is Secure Guest WiFi for Business So Important?

This entry was posted on by Yasmin Lasry.

Why is Secure Guest WiFi for Business So Important? Whether you run a financial office, a retail store or a marketing company, Wi-Fi Internet access is something that is expected by customers. You need however to make sure your guest…

An Article from PC World: What USB 3.2 and Wi-Fi 6 mean for your next PC

This entry was posted on by Yasmin Lasry.

You expect every laptop to have Wi-Fi and some kind of USB. What you probably don’t expect is battling specs that will make it difficult to know what sort of wireless and USB you have. We’ll sort it out for…

IT Maturity Model- Where Does Your Business Fit?

This entry was posted on by Yasmin Lasry.

Where Does Your Business Fit? IT Maturity is a company’s ability to stick to IT best practices. This, in turn, allows the companies to reap the most benefit from their IT initiatives.  The performance on the IT team closely resembles…

Sextortion Phishing Campaigns and How to avoid them

This entry was posted on by Yasmin Lasry.
Sextortion

Since late 2018, hackers have found yet another way to breach security at your expense. The latest that they’ve come up with is sextortion- or simply blackmail you into paying them money using your fears about your internet activities against…

Smart devices and Smart Businesses

This entry was posted on by Yasmin Lasry.

Smart devices have been making a buzz everywhere, from smart TVs to smart refrigerators, lights, blinds, etc. As the new norm in more and more aspects of our lives, smart homes are now filled with all sorts of gadgets powered…

Security Trends in 2019

This entry was posted on by Yasmin Lasry.

Cybersecurity issues have been making the news for a few years and we can expect significant breaches to occur even more often in the future. The further technology is pushed, with long lists of applications, devices and technological dependencies, the…

Business Changing IT Trends

This entry was posted on by Maria Kelebeev.

Business Changing IT Trends: While innovative technology is emerging almost daily, including AI, machine learning and blockchain, to name a few, as a small business owner such trends will have little or no effect on your business, unless you are…

5 Reasons to work with a Managed IT Services Provider

This entry was posted on by Maria Kelebeev.

When considering how to best enable your IT department, especially in a time of growth, businesses may not realize how much is at stake. With everything dependent on technology, whether it’s work stations, data storage, secure communications, internet access or…

Lessons from Entrepreneurs

This entry was posted on by Maria Kelebeev.
Entrepreneurs Show

MBC had the pleasure of attending the Toronto Entrepreneur Show. It was a day full of learning, exploring and networking catered for our core clients, small to medium-sized firms. In a presentation by Chris Baur, Vice President of Business Markets at…

Sizing up your IT needs

This entry was posted on by Maria Kelebeev.
Sizing-up your IT Needs

Let’s talk about sizing up your IT needs. Every company will need IT services, which will vary according to the firm’s size and stage. Companies may choose to fulfill their needs either in-house or by outsourcing help from a managed…

Lessons from the Google Cloud Summit

This entry was posted on by Maria Kelebeev.
Google Cloud Summit

On October 4, 2018, at the Enercare Center in Toronto, we had the opportunity to attend the Google Cloud Summit. It was a full day of learning what the latest cloud technology has to offer so that we can offer…

Vulnerability Assessments and Penetration Testing

This entry was posted on by Maria Kelebeev.
penetration testing

While the terms Vulnerability Assessments and Penetration Testing may be familiar and frequently used in security conversations, there is still some ambiguity about what they mean. Both play a vital role in a well-rounded security plan and vulnerability management, and…

MBC makes the list of Canada’s Fastest-Growing Companies

This entry was posted on by Maria Kelebeev.
MBC makes the list of  Canada’s Fastest-Growing Companies

MBC Managed IT Services Ranks on the 2018 Growth 500 of Canada’s Fastest-Growing Companies! – Canadian Business unveils 30th annual list of Canada’s Fastest-Growing Companies – Toronto (September 13, 2018) Canadian Business and Maclean’s today ranked MBC Managed IT Services…

Advance Threat Protection

This entry was posted on by Maria Kelebeev.
Advanced Thread Protection

In today’s cyber security landscape it is more important than ever to make sure to safe guard you systems. Advance Threat Protection protects your email, files, and Office 365 applications against unknown and sophisticated attacks. Microsoft Office 365 Advanced Threat Protection (ATP)…

Women in IT

This entry was posted on by Maria Kelebeev.
Celebrating Women in IT

While still relatively few in IT, women are gradually increasing in numbers and influence. To celebrate this growth and success, CDN and Ingram Micro Canada partnered to present the 8th annual CDN Women of the IT Channel Recognition luncheon on…

Innovation and Security

This entry was posted on by Maria Kelebeev.

Innovation and security might not seem as if they should be in conflict, but when creative steps forward open up new territories, they often also expose more vulnerabilities. So does this mean that in order to be secure, a growth…

Understanding IT Infrastructure

This entry was posted on by Maria Kelebeev.

Understanding IT infrastructure and what makes for a safe and efficient IT environment is the first step toward understanding what your business needs to keep running smoothly and safely. IT infrastructure is similar to city infrastructure, with its roads, highways,…

Phishing – What you need to look for

This entry was posted on by Maria Kelebeev.

Phishing is the fraudulent attempt to obtain your sensitive information. This includes info such as usernames and passwords to email accounts and credit card numbers. This is done by disguising as a trustworthy familiar contact and done via email. HOW…

Cyber Security Tips

This entry was posted on by Maria Kelebeev.

Cyber Security Tips: Cyber security is an issue for everyone to be concerned about. With technology woven into everything, it’s more important than ever to be careful about security. Here is a quick list of cyber security tips that are…

Selecting a Suitable Vendor

This entry was posted on by Maria Kelebeev.
Selecting a Suitable Vendor

Suitable Vendor: To ensure the wellbeing of your business, you might have to go through the process of selecting a suitable vendor more than once. As with in-house talent, the most successful vendor relationship results from a good match, which…

News and Updates

Latest tweets from MBC:

Why is Secure Guest WiFi for Business So Important? Read all about it in our newest blog post!mbccs.com/why-is-secure-…

From MBC's Twitter via Twitter Web Client

Join our newsletter!