24 Hour Support Desk (905) 307-4357



MBC Blog

Insights on Industry, Technology and Trends



Preparing for Post-Quantum Computer Cybersecurity

This entry was posted on by Pavel Odnoletkov.
Cyber security protection firewall interface concept

There’s no doubt that advances in computing technology have irreversibly changed the course of human history. From the first known computer in the early 1800s, through to the relatively recent popularization of the World Wide Web, each incremental advance in…

Top Ransomware Attacks of 2022

This entry was posted on by Pavel Odnoletkov.
Computer hacker

Remember the early days of the World Wide Web when getting a computer virus meant your monitor would pop up endless windows of embarrassing pornography while you frantically tried to close each one as it cascaded across the screen? While…

How Managed Service Providers Prevent Cyber Threats

This entry was posted on by Pavel Odnoletkov.
Cyber security protection

Managed service providers bring many different services to the table when they take on a new client. Most managed service providers can offer a wide range of support services including hardware and software maintenance, infrastructure management, cloud migration and support,…

Is Ransomware Still a Major Threat?

This entry was posted on by Pavel Odnoletkov.
ransomware virus at computer

Because the first known ransomware attack took place more than 30 years ago, people have been known to ask, “Is ransomware still a major threat?” It might be thought that these types of cybercrimes are old news, however they have…

What are the Top Cyber Security Threats?

This entry was posted on by Pavel Odnoletkov.
Cyber security

Cyber security has become an even bigger issue post-Covid lockdowns. It appears the loss of jobs and income turned more people towards the dark side of computing. Cyber scams targeting both businesses and individuals have ramped up significantly since the…

Why Businesses Need a Mobile Security Policy

This entry was posted on by Pavel Odnoletkov.
phone with VPN service enabled

The youngest people in the office may find it impossible to remember a time without mobile phones, tablets and laptops. Even the more experienced workers may have become dependent on a variety of handheld devices. Since working from home and…

Protecting Your Business With the Rise in Ransomware

This entry was posted on by Pavel Odnoletkov.
system security specialist

Ransomware has become one of the most popular methods used by cybercriminals to extort money from businesses and organizations. This is because of the potential financial windfall that can occur if an organization decides their data and computing systems are…

How Data Breaches Impact Your Business

This entry was posted on by Pavel Odnoletkov.
data breach warning

Corporate cybercriminals are becoming smarter, bolder and more determined than ever to gain financially using attacks such as phishing, malware and ransomware. This leaves many businesses vulnerable and scrambling to maintain the integrity of their data. Others may feel that…

Why Firewall Security is Essential for Your Business Network

This entry was posted on by Pavel Odnoletkov.
firewall activated on server room

As computer viruses, phishing attacks, ransomware and other types of hacker activities become more common, businesses have to be more aware of the consequences of a cyberattack. While several layers of protection can be used to prevent cyberattacks, firewalls are…

Seven Tips for Keeping Your Business Cyber Secure

This entry was posted on by Pavel Odnoletkov.
cyber security

While the 21rst century has seen the steady growth of business done online, the flexibility comes with more risk. With more people than ever working from home, some of the traditional cybersecurity measures are no longer quite as effective. Office…

Office IT Modernization with Microsoft

This entry was posted on by Pavel Odnoletkov.

According to many analysts, the increase in remote work that has emerged in workplaces in the past 2 years has significantly influenced the demand for corporate IT. With a complete suite of Microsoft products we can make your business more…

Should Small Companies Outsource Their IT?

This entry was posted on by Pavel Odnoletkov.
it outsourcing

When most small businesses are starting out, it’s usually one or two people who are doing everything. They’ll take care of the sales and marketing, the graphic design, the computer systems and even sweep the floors and take out the…

Endpoint Manager

This entry was posted on by Pavel Odnoletkov.

Microsoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises. Endpoint Manager includes the services and tools you use to manage and monitor mobile devices, desktop computers, virtual machines,…

What are the Most Important Policies for Your IT Security Strategy?

This entry was posted on by Pavel Odnoletkov.
IT Security

Policies are implemented to provide clear instructions for everyone involved in a specific situation. An IT security strategy is composed of policies to ensure an organization is guided by a uniform set of procedures which remove any ambiguity about how…

How To Prevent a Spooling Attack

This entry was posted on by Pavel Odnoletkov.
Close-Up View of System Hacking

For the average computer user, it’s a little-known fact that using a home or office printer creates a highly vulnerable situation that can be easily exploited by garden-variety hackers. However, in the computer industry, this vulnerability has been known about…

Why Windows Print Spooler Remains a Big Attack Target

This entry was posted on by Pavel Odnoletkov.
windows print spooler

The general public has been using the internet for so long that most of us are at least vaguely familiar with computer hacking tools such as viruses or malware. We may not understand exactly how they work, but we know…

How To Prevent Clone Phishing

This entry was posted on by Pavel Odnoletkov.
clone phishing

As more of our lives tend to take place online, crime has moved from the streets to the internet. And while cybercrime may not be as physically dangerous as being accosted in a dark back alley, the damages can still…

What To Do If You Click on a Phishing Link in an Email

This entry was posted on by Pavel Odnoletkov.
cyber attack

Cybercriminals are constantly updating their methods of extracting money and information out of their victims. One type of cybercrime that has been around in one form or another for several years is the clone phishing attack. In these social engineering…

What If I Clicked on a Phishing Link on My Phone?

This entry was posted on by Pavel Odnoletkov.
phishing link on phone

The cyber activity of phishing has been used by cybercriminals for several years to gain access to private or sensitive information. Phishing is a social engineering attack that uses messaging to trick a victim into giving up important data such…

How Does Clone Phishing Work?

This entry was posted on by Pavel Odnoletkov.
Clone Phishing

The proliferation of personal computers coinciding with the popularization of the internet promised us all untold richness of information. What it neglected to inform us about was the attendant rise of cybercriminal behaviour. Malware, identity theft and emails promising us…

News and Updates

Join our newsletter!