24 Hour Support Desk (905) 307-4357



MBC Blog

Insights on Industry, Technology and Trends



Top 6 Signs Someone’s Spying on Your Computer

This entry was posted on by Maria Kelebeev.
Top 6 Signs Someone’s Spying on Your Computer

While working away on your computer, you may not realize that you are not alone. Hackers are always attempting to infiltrate new devices and searching for vulnerable spots where they can lurk on your computer and steal sensitive data. Sometimes…

Cyber-Criminals are Deploying Advanced Malware for Ransomware and Data Espionage Attacks

This entry was posted on by Maria Kelebeev.
Cyber-Criminals are Deploying Advanced Malware for Ransomware and Data Espionage Attacks

Experts have warned that hackers are targeting Linux, Windows, and macOS operating systems with a sophisticated malware framework, called MATA. Researchers believe this framework has been used since 2018 by a well-known threat actor from North Korea, named Lazarus. A…

IBM Finds Cyberattacks Costing Companies Nearly $4 Million Per Breach

This entry was posted on by Maria Kelebeev.
IBM Finds Cyberattacks Costing Companies Nearly $4 Million Per Breach

A new report released from the Ponemon Institute and IBM Security advised that data breaches are now costing organizations almost $4 million. The report, titled ‘The Annual Cost of a Data Breach’ presented an in-depth look at what the financial…

How to Protect Your Data with Office 365 Backups

This entry was posted on by Maria Kelebeev.
How to Protect Your Data with Office 365 Backups

While Microsoft Office 365 is famed for its suite of collaborative and dynamic workspaces for consumers and businesses, Microsoft’s backup policies can’t guarantee a fast and complete restoration of lost data. The restore process can be complicated, lengthy, and depend…

How to Test the Strength of a Disaster Recovery Plan

This entry was posted on by Maria Kelebeev.
How to Test the Strength of a Disaster Recovery Plan

Having a strong business continuity and IT disaster recovery program is one thing on paper but another in real life. Failure to actually test business continuity and disaster recovery plans is a fatal mistake for many organizations and the lesson…

Cybersecurity After Coronavirus

This entry was posted on by Maria Kelebeev.
Cybersecurity After Coronavirus

Liviu Arsene, the security analyst for Bitdefender, recently shared some thoughts regarding the world of cybersecurity after coronavirus settles and what the long-term impact will be. In a recent interview, he stated “Right now IT and security teams should probably…

7 Common Cloud Technology Myths Debunked

This entry was posted on by Maria Kelebeev.
7 Common Cloud Technology Myths Debunked

If you are planning to migrate your business applications and workloads to the cloud, you may be concerned about some common myths.  Below are seven cloud technology myths currently spreading that we’ll debunk and explain the truth behind successfully supporting…

Why Many Businesses Will Outsource Their IT Needs After COVID-19

This entry was posted on by Maria Kelebeev.
Why Many Businesses Will Outsource Their IT Needs After COVID-19

The COVID-19 pandemic has wreaked havoc on many businesses, causing incredible financial strain. Unfortunately, for some, lay-offs and budget slashes have been necessary to remain afloat. As more organizations are clawing back on their IT budgets at a time where…

Cybersecurity Risks Rise with Remote Workers

This entry was posted on by Maria Kelebeev.
Cybersecurity Risks Rise with Remote Workers

Recent months have significantly changed the typical corporate environment, as millions of employees transitioned to remote home office work as a result of the COVID-19 crisis. As the transition was in haste in reaction to trying to curb the spread…

Why Multi-Factor Authentication is Essential for Password Security

This entry was posted on by Maria Kelebeev.
Why Multi-Factor Authentication is Essential for Password Security

Passwords alone can no longer keep cybercriminals at bay. Even by implementing all the latest recommendations and best practices in password management, unless your organization is using multi-factor authentication, you’re leaving yourself exposed against an attack. The Microsoft Tech Community…

Top Security Tips from MBC

This entry was posted on by Maria Kelebeev.
Top Security Tips from MBC

When it comes to keeping secure against the rapidly growing world of cyber threats, there is no shortage of areas where you and your organization need to remain vigilant. At MBC, we understand that these sinister threats can not only…

What are the Types of IT Services?

This entry was posted on by Maria Kelebeev.
What are the Types of IT Services

When searching for IT services for your business, all the different options available or jargon may seem confusing. It helps to first understand what are the types of IT services available and then pinpoint what exactly your business needs. Here…

How Many Cloud Technologies Are There?

This entry was posted on by Maria Kelebeev.
How Many Cloud Technologies Are There

Cloud technology has been a popular buzzword for several years and even though the term ‘cloud’ often conjures up images of faraway futuristic technology, it really isn’t that different from traditional computing architecture. The same physical hardware that forms the…

How Cyber Security Can Be Improved?

This entry was posted on by Maria Kelebeev.
How Cyber Security Can Be Improved

Small business owners are under the constant threat of cyber-attacks and the fear that they do not have adequate resources to protect themselves. Every day, the number of cyberattacks is growing and increasing the chance that your organization’s data may…

What Are the Most Common Cyber Attacks?

This entry was posted on by Maria Kelebeev.
What Are the Most Common Cyber Attacks

A deliberate and malicious attempt by hackers to breach, disrupt, or destroy the information system and network of an individual or organization is called a cyberattack. The number of cyberattacks is increasing globally every day, crippling businesses overnight and wreaking…

8 Essential Tips for Working from Home During the COVID-19 Pandemic

This entry was posted on by Maria Kelebeev.
8 Essential Tips for Working from Home During the COVID-19 Pandemic

Across the globe, many governments have asked citizens to remain home and practice social distancing measures. This has forced many businesses to rapidly shift to a remote work environment that allows employees to work from home. For a lot of…

Cloud Computing Resources at the Forefront of the COVID-19 Crisis

This entry was posted on by Maria Kelebeev.
Cloud Computing Resources at the Forefront of the COVID-19 Crisis

The COVID-19 pandemic has resulted in millions of students studying from home as well as employees working from home. With cloud computing, organizations are an essential link that keep many businesses and schools operating. This massive shift to social distancing…

COVID-19 Crisis Drives Cloud-Based Solutions

This entry was posted on by Maria Kelebeev.
COVID-19 Crisis Drives Cloud-Based Solutions

The current COVID-19 pandemic has made a strong business case for risk management. It has also driven a surge in businesses adopting cloud-based solutions as they try and scramble to transition to a work at home environment for most employees….

Cybersecurity Tips for Your Home Office During the COVID-19 Pandemic

This entry was posted on by Maria Kelebeev.
Cyber Security Tips for Working at Home During the COVID-19 Pandemic

As the COVID-19 pandemic unfolds, those working from home are put at risk of being exposed to fraudulent activity. Canadians have lost close to $100 million in reported online scams. Workers must find effective methods to protecting personal financial information….

New Microsoft Product Name Change

This entry was posted on by Maria Kelebeev.

On April 21, Microsoft announced naming changes on Office 365 subscriptions for small and medium businesses (SMBs). Existing subscriptions will be updated automatically with the new names. There are no price or business model changes to commercial subscriptions. Below is…

News and Updates

Latest tweets from MBC:

Click here to learn about the top 6 signs that someone is spying on your computer. ow.ly/EC2650Blc3p pic.twitter.com/EC0wNGKIgw

From MBC's Twitter via Hootsuite Inc.

Join our newsletter!