24 Hour Support Desk (905) 307-4357



MBC Blog

Insights on Industry, Technology and Trends



Multi-Factor Authentication

This entry was posted on by Pavel Odnoletkov.

MFA (multi-factor authentication) is becoming ever present. If you’ve ever been sent a text with a code after you’ve tried logging into a website, you’ve experienced it. YOU ARE NOT PROTECTED WITHOUT IT Multi-factor authentication is an authentication method in…

Co-Managed IT Services

This entry was posted on by Pavel Odnoletkov.

Do you have full time IT staff but need more from your IT? We can help fill in the gaps by working side by side with your staff. Co-Managed IT Services allow you to augment your current internal IT skillsets…

Ransomware

This entry was posted on by Pavel Odnoletkov.

Ransomware is a type of malicious software that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. HOW CAN IT AFFECT YOUR BUSINESS? When a user wants to access a file that…

MBC Private Cloud

This entry was posted on by Pavel Odnoletkov.

When you need data scalability, reliability, security and it isn’t practical at your office, cloud is often the solution. MBC can architect, deploy, and manage complex cloud requirements for your business. PRIVATE CLOUD There has never been a better time…

MBC VoIP Solution

This entry was posted on by Pavel Odnoletkov.

These next generation telephony solutions integrate your traditional telephone and voicemail services into a complete suite of mobile communications tools for your employees. Harness the power of your data network to deliver superior voice and collaboration services. Eliminate your long…

How Does Ransomware Spread?

This entry was posted on by Pavel Odnoletkov.
How Does Ransomware Spread

There’s been a lot of news about ransomware these days. Affected governments, administrations, and businesses have been extorted for millions of dollars to regain access to their data and systems – with varying levels of results. It can also happen…

What are Some Good Cyber Security Habits?

This entry was posted on by Pavel Odnoletkov.
What are Some Good Cyber Security Habits?

Ensuring your computer is secure is an important part of keeping it in good working condition. It will also make sure your information is safe and only shared with those to whom you’ve given permission. Cybersecurity actually comes down to…

What is Malware vs Virus?

This entry was posted on by Pavel Odnoletkov.
What is Malware vs Virus?

Most computer users have very likely come across the terms “malware” and “virus.” In fact, many computer users may have had firsthand experience with one or both of these ill-natured computer programs. And while the two terms are often used…

What is a Vulnerability Assessment?

This entry was posted on by Pavel Odnoletkov.
What is a Vulnerability Assessment?

A vulnerability assessment is a detailed evaluation of your organization’s networks and systems for potential weaknesses and threats. The process involves an analysis that locates and then accesses the consequence of each weakness to prioritize correcting any flaws in your…

Who is Responsible for Cyber Attacks?

This entry was posted on by Tammy Nyman.
Who is Responsible for Cyber Attacks?

According to research, the general public often holds the CEO of a company personally responsible for an organization’s cybersecurity. When organizations fall victim to cyber-attacks or data breaches, many people believe that C-level executives should be personally held accountable Plus,…

What are Good Reasons to Do Yearly Disaster Recovery Testing?

This entry was posted on by Tammy Nyman.
What are Good Reasons to Do Yearly Disaster Recovery Testing?

A disaster recovery plan is designed to navigate your business through ransomware attacks, hardware failures, natural disasters, and other unexpected disruptions. Unfortunately, many businesses will implement a backup system and disaster recovery solution, assuming that it works fine without validating…

Why Private Cloud is Better Than Public Cloud

This entry was posted on by Tammy Nyman.
Why Private Cloud is Better Than Public Cloud

While the public cloud has experienced substantial growth over the past few years and has many attractive benefits, there are certain circumstances why a private cloud may be better than a public cloud for your business. If your organization is…

What is the Difference Between Managed Services and Outsourcing?

This entry was posted on by Tammy Nyman.
What is the Difference Between Managed Services and Outsourcing?

Often, the terms outsourcing, and managed services are used interchangeably, and many people assume that they are the same thing. While both outsourcing and managed services involve services from other organizations, there are many differences between the two. Below, we’ll…

Will Cybersecurity Dominate Security Concerns in Coming Years?

This entry was posted on by Tammy Nyman.
Will Cybersecurity Dominate Security Concerns in Coming Years?

The massive and hasty transition to a huge global-scale remote workforce earlier this year has put an even bigger buzz on the topic of cybersecurity. While some governments and regulatory bodies such as the GDPR and EU’s Cybersecurity Act have…

56% of Professionals are Working on Cloud Migrations for 2020

This entry was posted on by Tammy Nyman.
56% of Professionals are Working on Cloud Migrations for 2020

According to the 2020 Progress Data Connectivity Report, this is the year that many organizations with strict regulatory requirements will overcome prior security concerns regarding migrating to the cloud. The reason? The benefits seem to outweigh the risks when it…

Top 6 Signs Someone’s Spying on Your Computer

This entry was posted on by Tammy Nyman.
Top 6 Signs Someone’s Spying on Your Computer

While working away on your computer, you may not realize that you are not alone. Hackers are always attempting to infiltrate new devices and searching for vulnerable spots where they can lurk on your computer and steal sensitive data. Sometimes…

Cyber-Criminals are Deploying Advanced Malware for Ransomware and Data Espionage Attacks

This entry was posted on by Tammy Nyman.
Cyber-Criminals are Deploying Advanced Malware for Ransomware and Data Espionage Attacks

Experts have warned that hackers are targeting Linux, Windows, and macOS operating systems with a sophisticated malware framework, called MATA. Researchers believe this framework has been used since 2018 by a well-known threat actor from North Korea, named Lazarus. A…

IBM Finds Cyberattacks Costing Companies Nearly $4 Million Per Breach

This entry was posted on by Tammy Nyman.
IBM Finds Cyberattacks Costing Companies Nearly $4 Million Per Breach

A new report released from the Ponemon Institute and IBM Security advised that data breaches are now costing organizations almost $4 million. The report, titled ‘The Annual Cost of a Data Breach’ presented an in-depth look at what the financial…

How to Protect Your Data with Office 365 Backups

This entry was posted on by Tammy Nyman.
How to Protect Your Data with Office 365 Backups

While Microsoft Office 365 is famed for its suite of collaborative and dynamic workspaces for consumers and businesses, Microsoft’s backup policies can’t guarantee a fast and complete restoration of lost data. The restore process can be complicated, lengthy, and depend…

How to Test the Strength of a Disaster Recovery Plan

This entry was posted on by Tammy Nyman.
How to Test the Strength of a Disaster Recovery Plan

Having a strong business continuity and IT disaster recovery program is one thing on paper but another in real life. Failure to actually test business continuity and disaster recovery plans is a fatal mistake for many organizations and the lesson…

News and Updates

Latest tweets from MBC:

Not sure what exactly IT sourcing and procurement involves and what it means for your business? Find out here. mbccs.com/what-is-sourci… pic.twitter.com/WJIoEZc8Gx

From MBC's Twitter via Hootsuite Inc.

Join our newsletter!