24 Hour Support Desk (905) 307-4357



MBC Blog

Insights on Industry, Technology and Trends



What is a Vulnerability Assessment?

This entry was posted on by Maria Kelebeev.
What is a Vulnerability Assessment?

A vulnerability assessment is a detailed evaluation of your organization’s networks and systems for potential weaknesses and threats. The process involves an analysis that locates and then accesses the consequence of each weakness to prioritize correcting any flaws in your…

Who is Responsible for Cyber Attacks?

This entry was posted on by Maria Kelebeev.
Who is Responsible for Cyber Attacks?

According to research, the general public often holds the CEO of a company personally responsible for an organization’s cybersecurity. When organizations fall victim to cyber-attacks or data breaches, many people believe that C-level executives should be personally held accountable Plus,…

What are Good Reasons to Do Yearly Disaster Recovery Testing?

This entry was posted on by Maria Kelebeev.
What are Good Reasons to Do Yearly Disaster Recovery Testing?

A disaster recovery plan is designed to navigate your business through ransomware attacks, hardware failures, natural disasters, and other unexpected disruptions. Unfortunately, many businesses will implement a backup system and disaster recovery solution, assuming that it works fine without validating…

Why Private Cloud is Better Than Public Cloud

This entry was posted on by Maria Kelebeev.
Why Private Cloud is Better Than Public Cloud

While the public cloud has experienced substantial growth over the past few years and has many attractive benefits, there are certain circumstances why a private cloud may be better than a public cloud for your business. If your organization is…

What is the Difference Between Managed Services and Outsourcing?

This entry was posted on by Maria Kelebeev.
What is the Difference Between Managed Services and Outsourcing?

Often, the terms outsourcing, and managed services are used interchangeably, and many people assume that they are the same thing. While both outsourcing and managed services involve services from other organizations, there are many differences between the two. Below, we’ll…

Will Cybersecurity Dominate Security Concerns in Coming Years?

This entry was posted on by Maria Kelebeev.
Will Cybersecurity Dominate Security Concerns in Coming Years?

The massive and hasty transition to a huge global-scale remote workforce earlier this year has put an even bigger buzz on the topic of cybersecurity. While some governments and regulatory bodies such as the GDPR and EU’s Cybersecurity Act have…

56% of Professionals are Working on Cloud Migrations for 2020

This entry was posted on by Maria Kelebeev.
56% of Professionals are Working on Cloud Migrations for 2020

According to the 2020 Progress Data Connectivity Report, this is the year that many organizations with strict regulatory requirements will overcome prior security concerns regarding migrating to the cloud. The reason? The benefits seem to outweigh the risks when it…

Top 6 Signs Someone’s Spying on Your Computer

This entry was posted on by Maria Kelebeev.
Top 6 Signs Someone’s Spying on Your Computer

While working away on your computer, you may not realize that you are not alone. Hackers are always attempting to infiltrate new devices and searching for vulnerable spots where they can lurk on your computer and steal sensitive data. Sometimes…

Cyber-Criminals are Deploying Advanced Malware for Ransomware and Data Espionage Attacks

This entry was posted on by Maria Kelebeev.
Cyber-Criminals are Deploying Advanced Malware for Ransomware and Data Espionage Attacks

Experts have warned that hackers are targeting Linux, Windows, and macOS operating systems with a sophisticated malware framework, called MATA. Researchers believe this framework has been used since 2018 by a well-known threat actor from North Korea, named Lazarus. A…

IBM Finds Cyberattacks Costing Companies Nearly $4 Million Per Breach

This entry was posted on by Maria Kelebeev.
IBM Finds Cyberattacks Costing Companies Nearly $4 Million Per Breach

A new report released from the Ponemon Institute and IBM Security advised that data breaches are now costing organizations almost $4 million. The report, titled ‘The Annual Cost of a Data Breach’ presented an in-depth look at what the financial…

How to Protect Your Data with Office 365 Backups

This entry was posted on by Maria Kelebeev.
How to Protect Your Data with Office 365 Backups

While Microsoft Office 365 is famed for its suite of collaborative and dynamic workspaces for consumers and businesses, Microsoft’s backup policies can’t guarantee a fast and complete restoration of lost data. The restore process can be complicated, lengthy, and depend…

How to Test the Strength of a Disaster Recovery Plan

This entry was posted on by Maria Kelebeev.
How to Test the Strength of a Disaster Recovery Plan

Having a strong business continuity and IT disaster recovery program is one thing on paper but another in real life. Failure to actually test business continuity and disaster recovery plans is a fatal mistake for many organizations and the lesson…

Cybersecurity After Coronavirus

This entry was posted on by Maria Kelebeev.
Cybersecurity After Coronavirus

Liviu Arsene, the security analyst for Bitdefender, recently shared some thoughts regarding the world of cybersecurity after coronavirus settles and what the long-term impact will be. In a recent interview, he stated “Right now IT and security teams should probably…

7 Common Cloud Technology Myths Debunked

This entry was posted on by Maria Kelebeev.
7 Common Cloud Technology Myths Debunked

If you are planning to migrate your business applications and workloads to the cloud, you may be concerned about some common myths.  Below are seven cloud technology myths currently spreading that we’ll debunk and explain the truth behind successfully supporting…

Why Many Businesses Will Outsource Their IT Needs After COVID-19

This entry was posted on by Maria Kelebeev.
Why Many Businesses Will Outsource Their IT Needs After COVID-19

The COVID-19 pandemic has wreaked havoc on many businesses, causing incredible financial strain. Unfortunately, for some, lay-offs and budget slashes have been necessary to remain afloat. As more organizations are clawing back on their IT budgets at a time where…

Cybersecurity Risks Rise with Remote Workers

This entry was posted on by Maria Kelebeev.
Cybersecurity Risks Rise with Remote Workers

Recent months have significantly changed the typical corporate environment, as millions of employees transitioned to remote home office work as a result of the COVID-19 crisis. As the transition was in haste in reaction to trying to curb the spread…

Why Multi-Factor Authentication is Essential for Password Security

This entry was posted on by Maria Kelebeev.
Why Multi-Factor Authentication is Essential for Password Security

Passwords alone can no longer keep cybercriminals at bay. Even by implementing all the latest recommendations and best practices in password management, unless your organization is using multi-factor authentication, you’re leaving yourself exposed against an attack. The Microsoft Tech Community…

Top Security Tips from MBC

This entry was posted on by Maria Kelebeev.
Top Security Tips from MBC

When it comes to keeping secure against the rapidly growing world of cyber threats, there is no shortage of areas where you and your organization need to remain vigilant. At MBC, we understand that these sinister threats can not only…

What are the Types of IT Services?

This entry was posted on by Maria Kelebeev.
What are the Types of IT Services

When searching for IT services for your business, all the different options available or jargon may seem confusing. It helps to first understand what are the types of IT services available and then pinpoint what exactly your business needs. Here…

How Many Cloud Technologies Are There?

This entry was posted on by Maria Kelebeev.
How Many Cloud Technologies Are There

Cloud technology has been a popular buzzword for several years and even though the term ‘cloud’ often conjures up images of faraway futuristic technology, it really isn’t that different from traditional computing architecture. The same physical hardware that forms the…

News and Updates

Latest tweets from MBC:

Why do annual disaster recovery testing? Find out here! mbccs.com/what-are-good-… pic.twitter.com/QMKFNY4JHB

From MBC's Twitter via Hootsuite Inc.

Join our newsletter!