24 Hour Support Desk (905) 307-4357



MBC Blog

Insights on Industry, Technology and Trends



MBC Sponsors FREIS 2021

This entry was posted on by Pavel Odnoletkov.

MBC is honored to be sponsoring the 2021 Foremost Real Estate Investment Series (“FREIS”)! As The Platinum Sponsor of this series, MBC is donating directly to Face the Future, a humanitarian medical mission, which allows disadvantaged children in countries around…

What is the Primary Argument Against Increasing Cybersecurity?

This entry was posted on by Pavel Odnoletkov.
What is the Primary Argument Against Increasing Cybersecurity

Our world is becoming increasingly reliant on the internet for almost every aspect of our lives.  It’s become the dominant platform in a number of crucial industries including banking, healthcare, communication, transportation, energy and government.  Protection of the internet infrastructure…

What Are the Threats for the Web Application Servers, and How Are They Managed?

This entry was posted on by Pavel Odnoletkov.
What Are the Threats for the Web Application Servers, and How Are They Managed?

Probably the biggest issue with web application server security is that it’s rarely taken seriously enough until after an attack occurs.  And of course, by then it’s too late.  Suddenly the proprietor is playing catch up by trying to create…

Security-First Managed IT Services

This entry was posted on by Pavel Odnoletkov.

Our Mission is to deliver Delightful IT which is a customer success model that ensures our partners are receiving an unparalleled client experience where we continually anticipate, meet, and exceed client expectations in a delightful way. Our promise is to…

What Stage Does Procurement Fall Within in the IT Equipment’s Life Cycle Management?

This entry was posted on by Pavel Odnoletkov.
What Stage Does Procurement Fall Within in the IT Equipment's Life Cycle Management?

The life cycle management of IT equipment continues to gain in importance as we rely more and more on technology.  It becomes even more essential as companies grow larger and division of labour becomes more pronounced.  From procurement to disposal,…

Why Should It Departments Be Responsible for Disaster Recovery Plans

This entry was posted on by Pavel Odnoletkov.
Why Should It Departments Be Responsible for Disaster Recovery Plans

In the modern day office, pretty much everyone understands the inconvenience and frustration of losing access to their computer systems.  Very often it will completely stop work dead.  When all of a company’s information exists in the cloud or on…

MBC Managed IT Services Named Among the Top MSPs

This entry was posted on by Pavel Odnoletkov.

Each year, Cloudtango recognizes the most successful managed service providers (MSPs) around the world in what has become a global reference due to its independent approach, and in-depth analysis. In the seventh edition of the awards, the selection process continues…

What is Going to be the Weakest Link of any Cybersecurity System?

This entry was posted on by Pavel Odnoletkov.
What is Going to be the Weakest Link of any Cybersecurity System?

As many businesses place greater focus on protecting their digital assets, they must also understand that that the biggest risk usually lies within their organization. Hackers prey on the weakest link in the ‘cyber chain’ which are emotions and psychological…

How to Prevent Phishing

This entry was posted on by Pavel Odnoletkov.
How to Prevent Phishing

One of the biggest security challenges that businesses face today is phishing attacks. It is becoming increasingly difficult for businesses to keep their information secure as hackers continue to deploy sophisticated ways to trick users into divulging sensitive information like…

IT Disaster Recovery Plan Template for Small Business

This entry was posted on by Pavel Odnoletkov.
IT Disaster Recovery Plan Template for Small Business

Taking the necessary steps to prepare for unexpected downtime and how to ensure a rapid return to normal operations is referred to as disaster recovery planning. DR planning can be a complex process, especially for small businesses with limited resources….

It Can Happen to You: Why Phishing Awareness Training is Critical

This entry was posted on by Pavel Odnoletkov.
It Can Happen to You: Why Phishing Awareness Training is Critical

It wasn’t too long ago that phishing attacks were largely aimed at the consumer market and malware was reserved for targeting businesses. Today, however, phishing secures the spot of being the top social threat to businesses and is estimated that…

What is URL Phishing?

This entry was posted on by Pavel Odnoletkov.
What is URL Phishing?

As cyber threats continue to grow and cause more problems to organizations across the globe, a pressing question on the minds of many IT professionals is ‘What is URL phishing?’ Cyber threats can be designed to steal intellectual property or…

Working From Home

This entry was posted on by Pavel Odnoletkov.

Tips for Staying Cyber-Secure While Working from Home As the dependency on digital infrastructure heightens, it’s more important than ever to make sure that your business has a secure BCP plan and an effective remote working policy with clear direction…

Multi-Factor Authentication

This entry was posted on by Pavel Odnoletkov.

MFA (multi-factor authentication) is becoming ever present. If you’ve ever been sent a text with a code after you’ve tried logging into a website, you’ve experienced it. YOU ARE NOT PROTECTED WITHOUT IT Multi-factor authentication is an authentication method in…

Co-Managed IT Services

This entry was posted on by Pavel Odnoletkov.

Do you have full time IT staff but need more from your IT? We can help fill in the gaps by working side by side with your staff. Co-Managed IT Services allow you to augment your current internal IT skillsets…

Ransomware

This entry was posted on by Pavel Odnoletkov.

Ransomware is a type of malicious software that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. HOW CAN IT AFFECT YOUR BUSINESS? When a user wants to access a file that…

MBC Private Cloud

This entry was posted on by Pavel Odnoletkov.

When you need data scalability, reliability, security and it isn’t practical at your office, cloud is often the solution. MBC can architect, deploy, and manage complex cloud requirements for your business. PRIVATE CLOUD There has never been a better time…

MBC VoIP Solution

This entry was posted on by Pavel Odnoletkov.

These next generation telephony solutions integrate your traditional telephone and voicemail services into a complete suite of mobile communications tools for your employees. Harness the power of your data network to deliver superior voice and collaboration services. Eliminate your long…

How Does Ransomware Spread?

This entry was posted on by Pavel Odnoletkov.
How Does Ransomware Spread

There’s been a lot of news about ransomware these days. Affected governments, administrations, and businesses have been extorted for millions of dollars to regain access to their data and systems – with varying levels of results. It can also happen…

What are Some Good Cyber Security Habits?

This entry was posted on by Pavel Odnoletkov.
What are Some Good Cyber Security Habits?

Ensuring your computer is secure is an important part of keeping it in good working condition. It will also make sure your information is safe and only shared with those to whom you’ve given permission. Cybersecurity actually comes down to…

News and Updates

Latest tweets from MBC:

MBC is honored to be sponsoring the 2021 Foremost Real Estate Investment Series by Foremost Financial Corporation. The series will kick off this Tuesday, March 2nd with John Pasalis, President of Realosophy Realty Inc Realty #webinar mbccs.com/mbc-sponsors-f…

From MBC's Twitter via Twitter Web App

Join our newsletter!