24 Hour Support Desk (905) 307-4357



MBC Blog

Insights on Industry, Technology and Trends



Why is IT Support Important?

This entry was posted on by Maria Kelebeev.
Why is IT Support Important

In today’s world, businesses need cutting edge technology to remain competitive. When an investment in technology has been made, no matter what size the organization is, having a professional IT support team is critical to making sure that everything runs…

How do Businesses Use Cloud Technology?

This entry was posted on by Maria Kelebeev.
How do Businesses Use Cloud Technology

Cloud computing is often promoted as a way to help businesses do more with less while maximizing their resources, budgets, and growth. But how do businesses actually use cloud technology and what is involved once the decision is made to…

How Can Cyber Security Be Improved?

This entry was posted on by Maria Kelebeev.
How Can Cyber Security Be Improved

Cyber security is a hot topic these days and for good reason. With technology woven into almost every aspect of business operations and cyber-attacks on the rise as they increase in sophistication, regardless of industry, all organizations must remain vigilant….

Can Macs Get Ransomware?

This entry was posted on by Maria Kelebeev.
Can Macs Get Ransomware

For years, Mac users were confident that they didn’t have to worry about getting viruses. In recent history, malware creators often stuck to the most predominately used operating systems in attempt to do as much damage as possible, but today…

Can Firewalls Prevent Ransomware?

This entry was posted on by Maria Kelebeev.
Can Firewalls Prevent Ransomware

When it comes to discussions regarding cyber security, you probably have heard about ‘firewalls’ and how they can be used to help protect your business from cyber-attacks. But can firewalls prevent ransomware threats well? Below, we will explain exactly what…

Canadian Business Excellence Award Winner

This entry was posted on by Maria Kelebeev.
Canadian Business Excellence Award

Canadian Business Excellence Award Winner! MBC Managed IT Services is thrilled to be named a 2020 recipient of the Canadian Business Excellence Awards for Private Businesses! After demonstrating a strategic approach to successfully improving business performance and achieving goals, with…

Who Can Do a Cyber Security Audit?

This entry was posted on by Maria Kelebeev.
Who Can Do a Cyber Security Audit

Having a cyber security plan for your business is essential in order to survive the increasing threat of looming digital attacks. Organizations need to be concerned about keeping their clients’ personal data safe, shield themselves from ransomware and ensure that…

Are Ransomware Attacks Data Breaches?

This entry was posted on by Maria Kelebeev.
Are Ransomware Attacks Data Breaches?

Ransomware attacks are when malware gets installed on a computer, typically via an email attack and can quickly infect an entire business network. Attackers demand a ‘ransom’ fine to be paid in order for the user or business to regain…

What Are Cyber Security Fundamentals?

This entry was posted on by Maria Kelebeev.
What Are Cyber Security Fundamentals?

Cyber security is the practice of protecting networks, systems, programs and devices from cyber attacks. These digital attacks are designed to typically do one or more of the following – extort money from users, destroy critical information, change or modify…

Is Private Cloud on Premise?

This entry was posted on by Maria Kelebeev.
Is Private Cloud on Premise

When researching different cloud solutions, many business owners wonder if a private cloud is on-premise. While it can be, there are actually two types of private cloud models, on-premise and hosted solutions. While both have similar features and advantages, the…

CDN 2019 Mentor of the Year

This entry was posted on by Maria Kelebeev.
Mentor of the Year | Tammy Nyman

CDN 2019 Mentor of the Year We are thrilled to announce that CDN 2019 Mentor of the Year award goes to our very own Tammy Nyman and will be presented at the Women in IT Channel Recognition Luncheon on August 22, 2019. Every year,…

Why Use a Private Cloud Over the Public Cloud?

This entry was posted on by Maria Kelebeev.
Why Use a Private Cloud Over the Public Cloud?

If you have been gathering information about cloud computing, you have probably already stumbled upon the debate on public cloud versus private cloud. If you are still unsure of why to use a private cloud over the public cloud, it…

What is Support Level 1?

This entry was posted on by Maria Kelebeev.
What is Support Level 1?

It is probably safe to say that almost everyone that has worked in a corporate office has had some type of experience dealing with an IT help desk. Also referred to as technical support, the help desk team assists users…

How Does Ransomware Work and Spread?

This entry was posted on by Maria Kelebeev.
How Does Ransomware Work and Spread?

One of the greatest threats that businesses face today is cyber extortion, otherwise known as Ransomware. Having grown into a billion dollar industry, in 2017, Ransomware was responsible for infecting over 4,000 businesses worldwide – every single day. Because Ransomware…

What Does Cloud Technology Mean?

This entry was posted on by Maria Kelebeev.
What Does Cloud Technology Mean?

Over the past ten years, ‘the cloud’ has emerged as one of the most popular technology solutions in the tech industry. But what is the cloud and how exactly does it impact you or your business? Simply put, using cloud…

Why is Secure Guest WiFi for Business So Important?

This entry was posted on by Yasmin Lasry.

Why is Secure Guest WiFi for Business So Important? Whether you run a financial office, a retail store or a marketing company, Wi-Fi Internet access is something that is expected by customers. You need however to make sure your guest…

An Article from PC World: What USB 3.2 and Wi-Fi 6 mean for your next PC

This entry was posted on by Yasmin Lasry.

You expect every laptop to have Wi-Fi and some kind of USB. What you probably don’t expect is battling specs that will make it difficult to know what sort of wireless and USB you have. We’ll sort it out for…

IT Maturity Model- Where Does Your Business Fit?

This entry was posted on by Yasmin Lasry.

Where Does Your Business Fit? IT Maturity is a company’s ability to stick to IT best practices. This, in turn, allows the companies to reap the most benefit from their IT initiatives.  The performance on the IT team closely resembles…

Sextortion Phishing Campaigns and How to avoid them

This entry was posted on by Yasmin Lasry.
Sextortion

Since late 2018, hackers have found yet another way to breach security at your expense. The latest that they’ve come up with is sextortion- or simply blackmail you into paying them money using your fears about your internet activities against…

Smart devices and Smart Businesses

This entry was posted on by Yasmin Lasry.

Smart devices have been making a buzz everywhere, from smart TVs to smart refrigerators, lights, blinds, etc. As the new norm in more and more aspects of our lives, smart homes are now filled with all sorts of gadgets powered…

News and Updates

Latest tweets from MBC:

Our executive vice-president, Tammy Nyman, was named the 2019 CDN Women in the IT Channel Mentor of the Year! CDN has just released an article highlighting why she was chosen to be honoured at the award event on August 22nd. Click here for the full story! channeldailynews.com/news/201… pic.twitter.com/KaPIegqJv2

From MBC's Twitter via Hootsuite Inc.

Join our newsletter!