24 Hour Support Desk (905) 307-4357



MBC Blog

Insights on Industry, Technology and Trends



Why are Humans the Weakest Link in Cybersecurity?

This entry was posted on by Rahim Karsan.

Quite often when people think of cybersecurity they think of a team of hackers hidden away in a basement in some far flung country. And while this scenario might be possible, the fact is that it’s a company’s own employees…

MBC Endpoint Detection and Response

This entry was posted on by Pavel Odnoletkov.

MBCs Endpoint Detection and Response, powered by SentinelOne®, is an integrated feature of MBCs RMM Monitoring tool that can help prevent, detect, and respond to evolving cyber-threats to your employees endpoints. Go beyond traditional antivirus and protect yourself against ransomware,…

Why Do Servers Need to be Managed Remotely?

This entry was posted on by Rahim Karsan.

It might not be absolutely necessary that servers are managed remotely but setting them up to do can make the lives of your IT team, and your business in general, much easier. Server problems can affect any aspect of your…

When Does a Company Start Their IT Disaster Recovery Process?

This entry was posted on by Rahim Karsan.

An unresolved IT disaster can be devastating for any business or organization. Whether caused by a technical failing, targeted attack, employee error or as the result of a natural disaster, steps must be in place to recognize the problem and…

What is the Primary Argument Against Increasing Cybersecurity?

This entry was posted on by Pavel Odnoletkov.
What is the Primary Argument Against Increasing Cybersecurity

Our world is becoming increasingly reliant on the internet for almost every aspect of our lives.  It’s become the dominant platform in a number of crucial industries including banking, healthcare, communication, transportation, energy and government.  Protection of the internet infrastructure…

What Are the Threats for the Web Application Servers, and How Are They Managed?

This entry was posted on by Pavel Odnoletkov.
What Are the Threats for the Web Application Servers, and How Are They Managed?

Probably the biggest issue with web application server security is that it’s rarely taken seriously enough until after an attack occurs.  And of course, by then it’s too late.  Suddenly the proprietor is playing catch up by trying to create…

Why Should It Departments Be Responsible for Disaster Recovery Plans

This entry was posted on by Pavel Odnoletkov.
Why Should It Departments Be Responsible for Disaster Recovery Plans

In the modern day office, pretty much everyone understands the inconvenience and frustration of losing access to their computer systems.  Very often it will completely stop work dead.  When all of a company’s information exists in the cloud or on…

MBC Managed IT Services Named Among the Top MSPs

This entry was posted on by Pavel Odnoletkov.

Each year, Cloudtango recognizes the most successful managed service providers (MSPs) around the world in what has become a global reference due to its independent approach, and in-depth analysis. In the seventh edition of the awards, the selection process continues…

What is Going to be the Weakest Link of any Cybersecurity System?

This entry was posted on by Pavel Odnoletkov.
What is Going to be the Weakest Link of any Cybersecurity System?

As many businesses place greater focus on protecting their digital assets, they must also understand that that the biggest risk usually lies within their organization. Hackers prey on the weakest link in the ‘cyber chain’ which are emotions and psychological…

How to Prevent Phishing

This entry was posted on by Pavel Odnoletkov.
How to Prevent Phishing

One of the biggest security challenges that businesses face today is phishing attacks. It is becoming increasingly difficult for businesses to keep their information secure as hackers continue to deploy sophisticated ways to trick users into divulging sensitive information like…

It Can Happen to You: Why Phishing Awareness Training is Critical

This entry was posted on by Pavel Odnoletkov.
It Can Happen to You: Why Phishing Awareness Training is Critical

It wasn’t too long ago that phishing attacks were largely aimed at the consumer market and malware was reserved for targeting businesses. Today, however, phishing secures the spot of being the top social threat to businesses and is estimated that…

What is URL Phishing?

This entry was posted on by Pavel Odnoletkov.
What is URL Phishing?

As cyber threats continue to grow and cause more problems to organizations across the globe, a pressing question on the minds of many IT professionals is ‘What is URL phishing?’ Cyber threats can be designed to steal intellectual property or…

How Does Ransomware Spread?

This entry was posted on by Pavel Odnoletkov.
How Does Ransomware Spread

There’s been a lot of news about ransomware these days. Affected governments, administrations, and businesses have been extorted for millions of dollars to regain access to their data and systems – with varying levels of results. It can also happen…

What are Some Good Cyber Security Habits?

This entry was posted on by Pavel Odnoletkov.
What are Some Good Cyber Security Habits?

Ensuring your computer is secure is an important part of keeping it in good working condition. It will also make sure your information is safe and only shared with those to whom you’ve given permission. Cybersecurity actually comes down to…

What is Malware vs Virus?

This entry was posted on by Pavel Odnoletkov.
What is Malware vs Virus?

Most computer users have very likely come across the terms “malware” and “virus.” In fact, many computer users may have had firsthand experience with one or both of these ill-natured computer programs. And while the two terms are often used…

What is a Vulnerability Assessment?

This entry was posted on by Pavel Odnoletkov.
What is a Vulnerability Assessment?

A vulnerability assessment is a detailed evaluation of your organization’s networks and systems for potential weaknesses and threats. The process involves an analysis that locates and then accesses the consequence of each weakness to prioritize correcting any flaws in your…

Who is Responsible for Cyber Attacks?

This entry was posted on by Tammy Nyman.
Who is Responsible for Cyber Attacks?

According to research, the general public often holds the CEO of a company personally responsible for an organization’s cybersecurity. When organizations fall victim to cyber-attacks or data breaches, many people believe that C-level executives should be personally held accountable Plus,…

Will Cybersecurity Dominate Security Concerns in Coming Years?

This entry was posted on by Tammy Nyman.
Will Cybersecurity Dominate Security Concerns in Coming Years?

The massive and hasty transition to a huge global-scale remote workforce earlier this year has put an even bigger buzz on the topic of cybersecurity. While some governments and regulatory bodies such as the GDPR and EU’s Cybersecurity Act have…

Top 6 Signs Someone’s Spying on Your Computer

This entry was posted on by Tammy Nyman.
Top 6 Signs Someone’s Spying on Your Computer

While working away on your computer, you may not realize that you are not alone. Hackers are always attempting to infiltrate new devices and searching for vulnerable spots where they can lurk on your computer and steal sensitive data. Sometimes…

Cyber-Criminals are Deploying Advanced Malware for Ransomware and Data Espionage Attacks

This entry was posted on by Tammy Nyman.
Cyber-Criminals are Deploying Advanced Malware for Ransomware and Data Espionage Attacks

Experts have warned that hackers are targeting Linux, Windows, and macOS operating systems with a sophisticated malware framework, called MATA. Researchers believe this framework has been used since 2018 by a well-known threat actor from North Korea, named Lazarus. A…

News and Updates

Latest tweets from MBC:

MBC Security Tip: Goodbye Passwords, Hello Passphrases. Strengthen your security with strong passwords that are simple to remember by using a passphrase that includes numbers and special characters like hello7dan$ingAlligat0rs. mbccs.com/it-business-so… #cybersecurity #infosec pic.twitter.com/ExdjFov1DR

From MBC's Twitter via Twitter Web App

Join our newsletter!