• Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • FAQs
  • Careers
  • Privacy Policy
  • Remote Support
(403) 237-7750
The ITeam
  • Home
  • Services
    • Managed IT Services
    • Cyber Security Calgary
      • Email Security
      • Security Training
    • Cloud Services
      • BaaS
      • IaaS
      • BCDR
      • DRaaS
      • Hosted Services
      • Microsoft Azure
    • Microsoft 365 Services
  • Industry
    • Construction
    • Healthcare
    • Oil & Gas
    • Legal Firm
    • Accounting
    • SME
    • Clients & Achievements
  • Your ITeam
    • Careers
  • Blog
    • News
  • Business Assessment
  • Contact Us
  • Menu Menu
  • Home
  • Services
    • Managed IT Services
    • Cyber Security Calgary
      • Email Security
      • Security Training
    • Cloud Services
      • BaaS
      • IaaS
      • BCDR
      • DRaaS
      • Hosted Services
      • Microsoft Azure
    • Microsoft 365 Services
  • Industry
    • Construction
    • Healthcare
    • Oil & Gas
    • Legal Firm
    • Accounting
    • SME
    • Clients & Achievements
  • Your ITeam
    • Careers
  • Blog
    • News
  • Business Assessment
  • Contact Us

Archive for category: Security Alert

Security Alert: Meltdown and Spectre Vulnerabilities

January 11, 2018/in Security Alert /by James Wagner

What Are Meltdown and Spectre?

Computer researchers have recently found out that the main chip in most modern computers—the CPU—has a hardware bug.

It’s really a design flaw in the hardware that has been there for years.

This is a big deal because it affects almost every computer, including PCs, laptops, smartphones, and servers.

This hardware bug allows malicious programs to steal data that is being processed in your computer memory.

Normally, applications are not able to do that because they are isolated from each other and the operating system.

This hardware bug breaks that isolation.

So, if the bad guys are able to get malicious software running on your computer, they can get access to your passwords stored in a password manager or browser, your emails, instant messages and even business-critical documents.

So, What Are We Doing About This?

There are two updates required by all computers.

The Windows updates were approved last week and should already be deployed to your computers.

A firmware update is also required and this is going to take some time; many of the patches are not even available yet.

Our team will work with you to schedule a time when the firmware updates can be applied as they become available.

Thankfully, there are no known active threats exploiting these vulnerabilities.

In the meantime, we need you to be extra vigilant, with security top of mind and Think Before You Click.

Please don’t hesitate to contact your ITeam Account Manager or IT Manager for more details.


The ITeam understands the cybersecurity issues facing Canada. We are committed to helping Calgary- and Alberta-based businesses develop proactive, cost-effective IT strategies that minimize risk and maximize efficiency. Contact us to learn more.

Important Take-Aways from the Equifax Data Breach

October 10, 2017/in Security Alert /by James Wagner

If cybersecurity wasn’t at the top of your to-do list, the recent Equifax data breach should have you on high alert.

Between May and July 2017, names, social security and social insurance numbers, birth dates, addresses, and driver’s license numbers were stolen, along with over 200,000 credit card numbers.

This breach primarily affected 145.5 million consumers in the United States, but thousands in Canada and the UK have been affected as well.

This data breach has the cybersecurity community reeling, and businesses and individuals alike are wondering what the next step is.

What’s shocking for many IT professionals is that despite available technology, breaches are usually caused by the simplest mistakes.

Proper preventative measures within the security infrastructure of any business could slow down hackers and even stop them entirely.

Here’s what you can do in light of the Equifax breach:

From the Business Perspective

The fallout of the Equifax data breach has compelled businesses of all sizes to ramp up cybersecurity. It is a critical element of any modern organization, and it’s risky to assume that large companies, such as Equifax, are the only targets, since hackers rely on inadequate security measures that are particularly evident in small businesses.

Unfortunately, breaches are not 100-% preventable. However, this is not to say that with strong security measures, these breaches can’t be drastically mitigated. By adequately preparing for a potential breach, you may greatly reduce the number of people affected and the amount of data compromised. Here are some ideas to help you prevent the next major security breach:

  • Segment networks – Too many user controls permit too much access. If your infrastructure is properly segmented, a breach can be restricted to small areas, prohibiting access to the entire database.
  • Require multi-factor authentication – This is a common method of security, requiring more than one method of authentication to verify a user’s identity.
  • Employ robust data encryption – Design your security system so that even if malicious attempts are successful, a hacker can’t interpret the contents.
  • Foster a commitment to functionality – Key to any successful cybersecurity strategy is some assurance that systems are working as they should. This involves regular updates as well as internal audits.

From a Personal Perspective

If you have a credit history, there is a chance that your information was compromised by the Equifax breach. Preventative measures can be utilized by consumers as well as businesses, and the following tips will help protect against identity theft:

  • Check to see if your data was compromised. The Office of the Privacy Commissioner of Canada has instructions and further guidance.
  • Check credit reports – Many credit card companies now provide your credit score for free. Investigate any changes in your credit, such as new accounts.
  • Request a credit freeze – Although this doesn’t prevent access to current accounts, no new accounts can be opened in your name.
  • Monitor your accounts closely –Alert your financial institutions of suspicious activity.
  • File taxes early – The earlier you file your taxes, the less likely it is that someone else will be able to file using your sensitive information.
  • Enroll in a credit monitoring service.

There is no such thing as perfect security, but with the right technological overhauls, a data breach does not have to be devastating. Protecting your data is the top priority, so make sure your cybersecurity efforts are at least on par with the existing threats. Let The ITeam help with your security through our managed it services.

The ITeam Security Bulletin: WannaCry Ransomware

May 17, 2017/5 Comments/in Security Alert /by James Wagner
Important information about WannaCry ransomware

You may have seen the news this weekend.
WannaCry Ransomware

Criminal hackers have released a new strain of ransomware that spreads itself automatically across all workstations in a network, causing a global epidemic.

If you or a co-worker are not paying attention and accidentally open one of these phishing email attachments, you might infect not only your own workstation but immediately everyone else’s computer too.

The initial infection was stopped on Friday, but it has since been rewritten and is again spreading in the wild.

There are 200,000 confirmed infections in over 150 countries as of this afternoon.

While most of the damage has been in Europe, Russia and Asia, there are over 6000 confirmed incidents in North America.

According to CrowdStrike’s Vice President of Intelligence Adam Meyers, the initial spread of WannaCry is coming through phishing, in which fake invoices, job offers and other lures are being sent out to random email addresses.

Within the emails is a password protected .zip file, so the email uses social engineering to persuade the victim to unlock the attachment with a password, and once clicked that initiates the WannaCry infection. Microsoft confirms this in a blog post.

Be very careful when you get an email with an attachment you did not ask for. If there is a .zip file in the attachment, do not click on it but delete the whole email. Remember: “When in doubt, throw it out!”

At The ITeam we work hard to ensure your networks are protected. Technology cannot stop every threat, and the last line of defence is alert and educated users.

Please share this information within your organization and outside your organization as you see fit. If your company requires IT support in Calgary, call us for a quote.

The ITeam Selected as a CDN Top 100 Solutions Provider in Canada

May 3, 2017/in Security Alert /by James Wagner

Calgary, Alberta – May 2, 2017 – The ITeam Ltd., Calgary’s leading source for Managed IT support and cloud services is pleased to announce that the company has been ranked in the 2017 CDN Top 100 Solution Providers in Canada, demonstrating The ITeam’s dedication to providing clients with superior service and support of top cloud solutions.

The Top 100 Solution Providers is an annual ranking produced by Computer Dealer News (CDN), the voice of the IT solution provider community in Canada since 1987. The ITeam ranked #100. A complete list of the Top 100 rankings can be found here: http://www.computerdealernews.com/top-100-solution-providers/top-100.

“We are honoured to have been selected as one of CDN’s Top 100 Solution Providers in Canada. The ITeam has worked diligently to enhance our cloud services to provide our clients with the most comprehensive, customizable, and cost-effective cloud solutions possible,” said James Wagner, President of The ITeam. “Our Calgary-based company is known for our commitment to quality.”

About The ITeam

The ITeam has been delivering quality IT results for over 20 years. As the shift to cloud computing has enabled businesses to be more nimble and capable of meeting customers’ needs, The ITeam has worked to provide the necessary support, security strategies, and partnership required to make the transitions easier. The ITeam delivers cost-effective, comprehensive, customized solutions to clients.

About Computer Dealer News

Computer Dealer News (CDN) — the voice of the IT solution provider community in Canada for more than thirty years — is the most widely read and trusted source of information for Canadian channel executives. Providing insightful commentary on technology products and services and covering the key players that are impacting this segment, CDN also delivers a critical analysis of the competitive landscape detailing both the challenges and opportunities facing solution providers. Each year, CDN connects with IT solution providers across the country to collect data for an industry benchmark report which, once compiled, presents an overview of this market segment as well as trends.

Locky: New, Insidious Ransomware

March 23, 2016/in Security Alert /by James Wagner

Locky: New, Insidious Ransomware

By now, we’re all familiar with the threat of ransomware, which accounts for nearly 20 percent of all spam.

One wrong click on a seemingly legitimate email and your network is held hostage.

Until you pay a ransom to the cyber hackers who managed to catch the unlucky email recipient off guard, your network remains vulnerable.

What Is Locky?

Locky is the latest ransomware to wreak havoc and works.

It contains a hidden JavaScript file in the attachment that evades most common malware detection software because it appears to be a harmless file.

Locky has proliferated so quickly that it now accounts for more than 16 percent of all ransomware attacks.

While the U.S., Japan, and France have been the most severely targeted, Locky has made its way to Canada.

Canadian businesses must take precautions against the threat.

How Does Ransomware Work?

Ransomware works by creating fear.

The messages are usually designed to make the recipient of the email believe that the email was sent by someone they trust.

It makes the recipient believe that the action needed to take (opening the file or clicking on the link) is necessary to conduct business and that it is an urgent matter.

Cyber hackers are clever, so businesses have to be constantly on alert.

In addition to implementing robust email security as well as offsite backup and recovery solutions, the most important step is to immediately warn staff.

It is easy to be fooled by emails that seem to be coming from legitimate sources, and once the person has clicked on the link or opened the file, there is no recovering.

Employees must learn to treat every email with caution and follow the ITeam Email security guidelines every time.

Download the ITeam Email Security Guide Here.

email security guide

Page 2 of 212

Request An Assessment

  • This field is for validation purposes and should be left unchanged.

Request your complimentary business assessment below. We will contact you within 24 hours.

Categories

  • Asset Management
  • Azure
  • BDR
  • Business Continuity
  • Cloud Hosting
  • Cloud Security
  • Compliance
  • Cybersecurity
  • Data Privacy
  • Dental IT
  • Disaster Recovery
  • Email Security
  • Energy IT
  • IoT Security
  • Legal IT
  • Managed IT
  • Mobile Device Management
  • Multifactor Authentication
  • Network Assessment
  • News
  • Office 365
  • Ransomware
  • Security Alert
  • Small Business IT
  • VCIO

Pages

  • Accounting Firms & Accountants
  • Blog
  • Business Assessment
  • Careers
  • Clients & Achievements
    • Kemp Orthodontics
    • The Power of Partnership – Wood Group
  • Cloud Services
    • Backup as a Service (BaaS)
    • Business Continuity & Disaster Recovery (BCDR)
    • Infrastructure As A Service (IaaS)
  • Construction
  • Contact
  • Cyber Security Calgary
  • Disaster Recovery with HC3 by Scale Computing
  • Email Security
  • Healthcare Clients
  • Hosted Services
  • IT Services Calgary
  • IT Services FAQ
  • Legal Firm
  • Managed IT Services
  • Master Services Agreement
  • Microsoft 365 Services
  • Microsoft Azure
  • News
  • Oil & Gas
  • On Demand IT Services
  • Privacy Policy
  • Security Awareness Training
  • Small and Medium-Sized Enterprises (SMEs)
  • support
  • Terms Of Service
  • Thank You
  • When is Your Business Ready for Managed IT Services
  • Why setting up a business in Calgary Is a Good Idea
  • Your ITeam

CONTACT US

Sales:
Phone: (403) 750-2540
Email: sales@theiteam.ca

General Inquiry:
Phone: (403) 237-7750
Email: info@theiteam.ca

Service & Support:
Phone: (403) 750-2525
support@theiteam.ca

FIND US

The ITeam IT Support Calgary
Suite 200, 1210 8 Street SW
Calgary, AB T2R 1L3
(403) 750-2540

Office Hours:
Monday to Friday: 8AM to 5PM
(Mountain Standard Time)
IT Support Calgary The ITeam $$ (403) 750-2540 Calgary, AB
5

stars

"The ITeam provides peace of mind with high level security and superb customer service." - Jeff B.

OUR SERVICES

  • Managed IT Services
  • On Demand IT Services
  • Hosted Services
  • Clients & Achievements
LinkedIn | FB | Twitter | Instagram
Privacy Policy
Copyright © 2020 The iTeam.ca | All Rights Reserved
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OK

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refuseing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Accept settingsHide notification only