Blog

Cybersecurity insurance, part 1: What is it, and do I need it?

Cybersecurity insurance, part 1: What is it, and do I need it?

As ransomware attacks become more prevalent, many businesses are turning to cybersecurity insurance to transfer risk and mitigate some of the costs of various cyberattacks. Those negative effects are enough to give even the most confident CEO and CIO pause—a...

read more
Revolutionize your retail operations with cloud technology

Revolutionize your retail operations with cloud technology

In 2020, sales via eCommerce increased by 43%, indicating a significant change in consumer behavior and expectations. As a result, previously trusted retail technology is strained by the spike in customer demand. But cloud migration services from OnX offer a long-term...

read more
Strategize your cloud transformation for greater success

Strategize your cloud transformation for greater success

At the onset of cloud technology, many experts believed that the Cloud would be restricted to improving network traffic speeds and boosting software development rates. But the functionality of cloud computing continues to adapt and expand. In fact, you could argue...

read more
IT Modernization for Canadian government agencies

IT Modernization for Canadian government agencies

Like virtually every enterprise around the world these days, the Canadian government is under pressure to modernize infrastructure and streamline processes in order to accommodate an increasingly digitized society. From local municipalities to the provinces and all...

read more
The transformative power of cloud computing for healthcare

The transformative power of cloud computing for healthcare

Modern healthcare providers face many challenges. Some depend on aging technology that is difficult and expensive to maintain. Security is also a core concern, as ransomware routinely targets providers. Additionally, staying compliant with government regulations is a...

read more
Building a Culture of Cybersecurity Awareness

Building a Culture of Cybersecurity Awareness

According to Microsoft's X-Force Threat Intelligence Index 2022, phishing attacks—which rely on human error and deception—cause 40% of all data breaches. Contrary to popular belief, few cyber-attacks solely consist of technology-based malware. Instead, experts...

read more
OnX boosts productivity as best-in-class IT solutions company

OnX boosts productivity as best-in-class IT solutions company

Technology geared for enterprises continues to become more complex as operational needs and client demands evolve. As a result, modern companies face many IT challenges, including managing network performance, maximizing uptime, meeting escalating cyber security...

read more
Top six innovative communication tools in healthcare

Top six innovative communication tools in healthcare

Healthcare business operations are rapidly changing in our ever-evolving technological landscape. Communication tools in healthcare help providers keep pace with technology innovation and meet their patients’ needs. Unfortunately, many solutions create new issues for...

read more
I just met a vuln named Follina

I just met a vuln named Follina

Happy summer, everyone! To celebrate, there’s a new Microsoft Windows zero-day vulnerability, currently classified by NVD as CVE-2022-30190, and nicknamed by the community as Follina. It exploits a flaw in the Microsoft Support Diagnostic Tool (MSDT) that uses the...

read more
Four powerful questions to ask IT staffing partners

Four powerful questions to ask IT staffing partners

In recent years, the IT talent gap has become a core obstacle to technology enterprises, exacerbated by the swift pivot to remote work caused by the COVID-19 pandemic. According to Fortune Magazine, the talent gap has led to overall pay spikes of 14% or greater for IT...

read more
How to make your IT workforce as dynamic as your infrastructure

How to make your IT workforce as dynamic as your infrastructure

Even as the enterprise struggles to keep up with rapidly changing technology, challenges are also mounting in another key area: finding the right people to manage increasingly dynamic and automated workflows. So how do you build an IT workforce that is as agile as your enterprise infrastructure?

read more
How CIS Controls Can Simplify Cybersecurity

How CIS Controls Can Simplify Cybersecurity

Our previous blog post explored how security frameworks like ITSG-33 and the NIST Cybersecurity Framework (CSF) can help make your enterprise ransomware resistant. While there is a lot of information out there about these frameworks, the complicated steps recommended...

read more
How do you ensure the security of your supply chain?

How do you ensure the security of your supply chain?

In July another major crypto ransomware attack occurred, this time through an enterprise software vendor called Kaseya. For many CEOs or business owners, that name might not be familiar, since many of the companies that use this software are Managed Service Providers...

read more
Let OnX navigate your journey to AWS for government

Let OnX navigate your journey to AWS for government

From federal agencies to local municipalities, Canadian government organizations are transforming the way they do business with help from cloud platforms like Amazon Web Services (AWS). With thousands of government entities now using AWS, departments across Canada are...

read more
Delivering a trustworthy cloud for government service

Delivering a trustworthy cloud for government service

Like most enterprises around the globe, government organizations require access to the same cloud-based innovations currently enabling digital transformation across the private sector. By leveraging these innovative tools, federal, provincial and municipal departments...

read more
Secure business growth with an AWS Well-Architected Framework

Secure business growth with an AWS Well-Architected Framework

Enterprises are facing a crucial stage in their evolution, moving from traditional products and services to a more agile digital economy that is application-centric. Although it’s showing its age, legacy infrastructure still plays a role in enterprise operations, due...

read more
SD-WAN advantages for your hybrid work-from-home model

SD-WAN advantages for your hybrid work-from-home model

The business world is still adapting to the remote work environment brought about by the COVID-19 pandemic. As a result of this new normal, the ideas of network infrastructure and application cloud migration have shifted from “maybe someday” to “when and how?” As more...

read more
How to prepare your enterprise with AWS cloud solutions

How to prepare your enterprise with AWS cloud solutions

The new digital economy demands that enterprises be flexible in order to succeed, meaning they need a nimble cloud environment that surpasses both the cost and performance of outdated legacy infrastructure. With time-to-market being such a crucial facet of the modern...

read more
Top 5 cybersecurity actions to take right now

Top 5 cybersecurity actions to take right now

I’m finding that as I get older, my memory is starting to slowly fail me. You know that feeling when you walk into a room, and can’t remember what you came in there for? I know it’s not a unique experience, but it’s still pretty frustrating. Writing things down is...

read more
The Benefits of Network as a Service (NaaS)

The Benefits of Network as a Service (NaaS)

Multi-site organizations often struggle with the costs and complexities of managing separate wide area networks (WAN) that connect several locations. As businesses add new offices and advanced technologies to their IT infrastructure, these demands can stretch existing...

read more
F5 Vulnerabilities and Necessary Next Steps

F5 Vulnerabilities and Necessary Next Steps

F5 announced new vulnerabilities and fixes for both BIG-IP and BIG-IQ, including four critical CVEs. These vulnerabilities affect all BIG-IP and BIG-IQ customers, and F5 is strongly recommending all BIG-IP and BIG-IQ systems be updated to fixed versions as...

read more
How to transform your data security program with automation

How to transform your data security program with automation

Data security remains at the forefront of concerns for CEOs, as two of the biggest breaches in Canadian history took place in 2019, with one breach resulting in the theft of the personal information of 15 million people in Ontario and B.C. A 2019 CIRA Cybersecurity...

read more

Load More