24 Hour Support Desk (905) 307-4357



MBC Blog

Insights on Industry, Technology and Trends



MBC’s 365 Total Defence

This entry was posted on by Pavel Odnoletkov.

Microsoft 365 is the most targeted platform for cyber criminals due to its global popularity. Since 2019 cyber attacks on this business solution have been steadily increasing, and by the end of last year have accounted for over 70% of…

How Does An IT Audit Differ From A Security Assessment?

This entry was posted on by Pavel Odnoletkov.
How Does An IT Audit Differ From A Security Assessment

Although an IT audit and a security assessment are very similar things, there are some important differences. How does an IT audit differ from a security assessment? Both are integral parts of a risk management system, but they’re each carried…

Why A Company Needs To Use Firewall And Router

This entry was posted on by Pavel Odnoletkov.
Why A Company Needs To Use Firewall And Router

Because so many companies depend on an internet connection to function, protection against malicious online attacks has become a fact of doing business. But is it possible to rely on the protection provided by your router and operating system software?…

What Does A Firewall Protect Your Company Against?

This entry was posted on by Pavel Odnoletkov.
Firewall Protect Your Company

As more of the world becomes familiar with how the internet works, there’s a proportional increase in the number of people who use it for malicious purposes. Protecting your company against cybercriminals and pranksters may appear to be above and…

How Often Should A Business Continuity Plan Be Tested?

This entry was posted on by Pavel Odnoletkov.
How Often Should A Business Continuity Plan Be Tested

In today’s business environment, even short amounts of downtime can lead to large losses. Ensuring your business or organization can quickly recover from both a short interruption and a major disaster is the basis of a business continuity plan (BCP.)…

What Is The Purpose Of An IT Audit?

This entry was posted on by Pavel Odnoletkov.
What Is The Purpose Of An IT Audit

As more of the world’s businesses become dependent on information technologies, the functioning, regulation, stability, security and recovery of those systems are as integral to the business as the business itself. In other words, any company that depends on information…

What Would Happen If IT Services of a Retailer Were Attacked?

This entry was posted on by Pavel Odnoletkov.
What Would Happen If IT Services of a Retailer Were Attacked

Because they regularly deal in monetary transactions, retailers are under constant threat from malicious actors. This has become even more pronounced with the increase in online shopping. To know what would happen if IT services of a retailer were attacked,…

What IT Services Should Be Kept Inside, and What Services Can Be Outsourced?

This entry was posted on by Pavel Odnoletkov.
What IT Services Should Be Kept Inside, and What Services Can Be Outsourced

When a business is first started, everything is typically done in-house. Very often there’s no budget for hiring other people or outsourcing specialized jobs. But once a company gets on its feet, it needs to start making decisions about what…

MBC Cyber Security Experts

This entry was posted on by Pavel Odnoletkov.

Cyber Security is more than a technology issue. It’s a critical business risk. As a security-first Managed Services Provider, we act as our client’s trusted go-to partner bringing advanced expertise in the current threat landscape. An extension of your team,…

Why are Humans the Weakest Link in Cybersecurity?

This entry was posted on by Pavel Odnoletkov.

Quite often when people think of cybersecurity they think of a team of hackers hidden away in a basement in some far flung country. And while this scenario might be possible, the fact is that it’s a company’s own employees…

MBC Endpoint Detection and Response

This entry was posted on by Pavel Odnoletkov.

MBCs Endpoint Detection and Response, powered by SentinelOne®, is an integrated feature of MBCs RMM Monitoring tool that can help prevent, detect, and respond to evolving cyber-threats to your employees endpoints. Go beyond traditional antivirus and protect yourself against ransomware,…

Why Do Servers Need to be Managed Remotely?

This entry was posted on by Pavel Odnoletkov.

It might not be absolutely necessary that servers are managed remotely but setting them up to do can make the lives of your IT team, and your business in general, much easier. Server problems can affect any aspect of your…

When Does a Company Start Their IT Disaster Recovery Process?

This entry was posted on by Pavel Odnoletkov.

An unresolved IT disaster can be devastating for any business or organization. Whether caused by a technical failing, targeted attack, employee error or as the result of a natural disaster, steps must be in place to recognize the problem and…

What is the Primary Argument Against Increasing Cybersecurity?

This entry was posted on by Pavel Odnoletkov.
What is the Primary Argument Against Increasing Cybersecurity

Our world is becoming increasingly reliant on the internet for almost every aspect of our lives.  It’s become the dominant platform in a number of crucial industries including banking, healthcare, communication, transportation, energy and government.  Protection of the internet infrastructure…

What Are the Threats for the Web Application Servers, and How Are They Managed?

This entry was posted on by Pavel Odnoletkov.
What Are the Threats for the Web Application Servers, and How Are They Managed?

Probably the biggest issue with web application server security is that it’s rarely taken seriously enough until after an attack occurs.  And of course, by then it’s too late.  Suddenly the proprietor is playing catch up by trying to create…

Why Should It Departments Be Responsible for Disaster Recovery Plans

This entry was posted on by Pavel Odnoletkov.
Why Should It Departments Be Responsible for Disaster Recovery Plans

In the modern day office, pretty much everyone understands the inconvenience and frustration of losing access to their computer systems.  Very often it will completely stop work dead.  When all of a company’s information exists in the cloud or on…

MBC Managed IT Services Named Among the Top MSPs

This entry was posted on by Pavel Odnoletkov.

Each year, Cloudtango recognizes the most successful managed service providers (MSPs) around the world in what has become a global reference due to its independent approach, and in-depth analysis. In the seventh edition of the awards, the selection process continues…

What is Going to be the Weakest Link of any Cybersecurity System?

This entry was posted on by Pavel Odnoletkov.
What is Going to be the Weakest Link of any Cybersecurity System?

As many businesses place greater focus on protecting their digital assets, they must also understand that that the biggest risk usually lies within their organization. Hackers prey on the weakest link in the ‘cyber chain’ which are emotions and psychological…

How to Prevent Phishing

This entry was posted on by Pavel Odnoletkov.
How to Prevent Phishing

One of the biggest security challenges that businesses face today is phishing attacks. It is becoming increasingly difficult for businesses to keep their information secure as hackers continue to deploy sophisticated ways to trick users into divulging sensitive information like…

It Can Happen to You: Why Phishing Awareness Training is Critical

This entry was posted on by Pavel Odnoletkov.
It Can Happen to You: Why Phishing Awareness Training is Critical

It wasn’t too long ago that phishing attacks were largely aimed at the consumer market and malware was reserved for targeting businesses. Today, however, phishing secures the spot of being the top social threat to businesses and is estimated that…

News and Updates

Join our newsletter!