• Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • FAQs
  • Careers
  • Privacy Policy
  • Remote Support
(403) 237-7750
The ITeam
  • Home
  • Services
    • Managed IT Services
    • Cyber Security Calgary
      • Email Security
      • Security Training
    • Cloud Services
      • BaaS
      • IaaS
      • BCDR
      • DRaaS
      • Hosted Services
      • Microsoft Azure
    • Microsoft 365 Services
  • Industry
    • Construction
    • Healthcare
    • Oil & Gas
    • Legal Firm
    • Accounting
    • SME
    • Clients & Achievements
  • Your ITeam
    • Careers
  • Blog
    • News
  • Business Assessment
  • Contact Us
  • Menu Menu
  • Home
  • Services
    • Managed IT Services
    • Cyber Security Calgary
      • Email Security
      • Security Training
    • Cloud Services
      • BaaS
      • IaaS
      • BCDR
      • DRaaS
      • Hosted Services
      • Microsoft Azure
    • Microsoft 365 Services
  • Industry
    • Construction
    • Healthcare
    • Oil & Gas
    • Legal Firm
    • Accounting
    • SME
    • Clients & Achievements
  • Your ITeam
    • Careers
  • Blog
    • News
  • Business Assessment
  • Contact Us

Archive for category: Small Business IT

Aligning Business and IT Strategies

Aligning Business and IT Strategies: Overcome the Economic Downturn Post-Pandemic

September 2, 2020/in Managed IT, Small Business IT /by James Wagner

Ransomware attacks are on the rise in Canada. Disaster Recovery as a Service (DRaaS) is a critical protection against ransomware for any organization.

Read more
Coronavirus phishing and email scams

Coronavirus Scams: How to Protect Yourself and Your Business

June 2, 2020/1 Comment/in Business Continuity, Small Business IT /by James Wagner

Coronavirus scams threaten your personal data and your business. The ITeam provides guidance for how to protect yourself from these scams.

Read more
Coronavirus (COVID-19): An IT Guide for Small and Medium-Sized Enterprises

Coronavirus (COVID-19): An IT Guide for Small and Medium-Sized Enterprises

April 15, 2020/2 Comments/in Business Continuity, Small Business IT /by James Wagner

As more people around the globe are impacted by the novel Coronavirus pandemic, The ITeam has created an IT guide for businesses.

Read more
small business

Can Your Small Business Afford the Risk?

January 13, 2020/in Small Business IT /by James Wagner

small business it protectionThe average cost of a cyberattack now exceeds $1 million, reports Security Magazine. Can you afford to lose that kind of money and remain in business? Most small businesses can’t, but more than half of those small businesses responding to a recent security report survey experienced a breach last year. In fact, according to Accenture, 43% percent of cyberattacks are aimed at small businesses, but only 14% of small businesses are prepared to defend themselves. According to Kaspersky, more than a third of small businesses fell victim to cyberattacks in 2019. Even more concerning is the fact that more than two-thirds of small business leaders do not believe they are a target.

Steps Your Small Business Must Take Now to Survive

Every organization needs to take the threat of cyberattack more seriously, especially in light of recent tensions that make cyber warfare more likely than ever.  Start with these 5 steps:

  1. Backup and disaster recovery. Avoid paying ransoms and losing access to your data, by having a comprehensive backup and disaster recovery plan. This plan should include offsite backups of your data that are isolated from and not accessible by your network, as well as contingency planning for how your organization will handle data recovery, designating specific people for specific rolls. Read our guide on creating an effective disaster recovery plan.
  1. Regular updates. Not only should you have strong anti-virus and malware protection, but you should also ensure that you regularly install patches, upgrade software, and manage apps to avoid security risk. In particular, there should be no instances of Windows 7 operating at all.
  1. Strong policies. In addition to limiting data access to only those employees who actually need access to perform their jobs, you should implement strict policies for using personal devices to access the company network from public Wi-Fi, strong mobile device security requirements for all devices used for work, and ongoing training requirements for all employees.
  1. Email security. In addition to securely hosted email, establish policies regarding payment and information requests sent by email. Email security and training are essential.
  1. Multifactor authentication. Password security is no longer adequate to protect your network and your data. Require multifactor authentication for access to any part of your network. This should include a password that is combined with a secondary, required security protocol, such as a mobile authentication app for quick push notifications, as well as some form of biometric security.

Whether you are a healthcare firm, an oil and gas company, a legal firm, or a part of the many other industries The ITeam supports, such as construction and accounting, organizations need strong IT security. The ITeam understands the IT security issues facing Canada businesses. We are committed to helping Calgary- and Alberta-based businesses develop proactive, cost-effective IT strategies that minimize risk and maximize efficiency. Contact us to learn more.

your password IS the problem

Your Password IS a Problem

December 10, 2019/1 Comment/in Managed IT, Small Business IT /by James Wagner

Data security is something every organization in Canada must contend with. Implementing layers of security and 24/7 threat detection can help provide protection, like leaving the your door locked at all times so no one can just walk into your business. But when your staff (executives included) reuse passwords across a variety of different sites and apps, they’ve essentially left the keys to your most valuable information in the lock.

The Password Problem

the password problemHackers have passwords, and they know that people use them on multiple sites. As well, hackers use social engineering to know which executives in your organization have financial roles. And they can use the password they stole from a shopper’s club loyalty card account database, for instance, and try it on your network. And this method often works.  Hackers also know that the more complex passwords become, the more likely people are to come up with two or three variations of one that works (i.e., it meets all the criteria for one capital letter, one number, one symbol) and reuse it everywhere – from their grocery store loyalty card accounts to your network.

But it’s more than just the repeated use of the same passwords across different apps and sites that poses a risk to your business; it’s the fact that many people don’t change their passwords even after being notified of a breach. How many of your employees are still using the same passwords (or variations) following the Yahoo data breach? The LinkedIn breach? The Capital One breach?

It Takes More than Passwords to Keep Your Data Safe

Yes, you still need to have strict password policies. But in addition to that, you must:

  • Provide ongoing, in-depth training to your staff about threats, including common email threats
  • Establish and follow a strict patching regimen so that you prevent potential access to your data through a back door
  • Implement as many barriers as possible against a data breach, including layers of security (firewalls, malware detection, network security)
  • Monitor your systems 24/7 for threats
  • Delete access immediately – including remote access – for any employee who leaves the company
  • Require a multi-factor authentication to access any secure area of your network
  • Have the capability of logging and monitoring who is doing what inside your network

Protecting data is one of the most complex issues facing organizations today. It’s not just about PIPEDA compliance, although that is a significant factor, but it’s also about protecting proprietary data, customer information, trade secrets, and financial information. Complicating all of this are the hackers who continue to develop more insidious ways to penetrate your defenses, gain access to your data, and either sell it or use it for financial gain. Employing best practices does make a difference.

Data breaches are not going away, but you can minimize the risk to your organization with strong IT security and a comprehensive disaster recovery plan. You can’t just address one of these issues; you must have a comprehensive, proactive data security program that addresses all of these risks and more.

The ITeam understands the IT security issues facing businesses in Canada. We are committed to helping Calgary- and Alberta-based businesses develop proactive, cost-effective IT strategies that minimize risk and maximize efficiency. Contact us to learn more.

Page 1 of 3123

Request An Assessment

  • This field is for validation purposes and should be left unchanged.

Request your complimentary business assessment below. We will contact you within 24 hours.

Categories

  • Asset Management
  • Azure
  • BDR
  • Business Continuity
  • Cloud Hosting
  • Cloud Security
  • Compliance
  • Cybersecurity
  • Dental IT
  • Disaster Recovery
  • Email Security
  • Energy IT
  • IoT Security
  • Legal IT
  • Managed IT
  • Mobile Device Management
  • Multifactor Authentication
  • Network Assessment
  • News
  • Office 365
  • Ransomware
  • Security Alert
  • Small Business IT
  • VCIO

Pages

  • Accounting Firms & Accountants
  • Blog
  • Business Assessment
  • Careers
  • Clients & Achievements
    • Kemp Orthodontics
    • The Power of Partnership – Wood Group
  • Cloud Services
    • Backup as a Service (BaaS)
    • Business Continuity & Disaster Recovery (BCDR)
    • Infrastructure As A Service (IaaS)
  • Construction
  • Contact
  • Cyber Security Calgary
  • Disaster Recovery with HC3 by Scale Computing
  • Email Security
  • Healthcare Clients
  • Hosted Services
  • IT Services Calgary
  • IT Services FAQ
  • Legal Firm
  • Managed IT Services
  • Master Services Agreement
  • Microsoft 365 Services
  • Microsoft Azure
  • News
  • Oil & Gas
  • On Demand IT Services
  • Privacy Policy
  • Security Awareness Training
  • Small and Medium-Sized Enterprises (SMEs)
  • support
  • Terms Of Service
  • Thank You
  • When is Your Business Ready for Managed IT Services
  • Why setting up a business in Calgary Is a Good Idea
  • Your ITeam

CONTACT US

Sales:
Phone: (403) 750-2540
Email: sales@theiteam.ca

General Inquiry:
Phone: (403) 237-7750
Email: info@theiteam.ca

Service & Support:
Phone: (403) 750-2525
support@theiteam.ca

FIND US

The ITeam IT Support Calgary
Suite 200, 1210 8 Street SW
Calgary, AB T2R 1L3
(403) 750-2540

Office Hours:
Monday to Friday: 8AM to 5PM
(Mountain Standard Time)
IT Support Calgary The ITeam $$ (403) 750-2540 Calgary, AB
5

stars

"The ITeam provides peace of mind with high level security and superb customer service." - Jeff B.

OUR SERVICES

  • Managed IT Services
  • On Demand IT Services
  • Hosted Services
  • Clients & Achievements
LinkedIn | FB | Twitter | Instagram
Privacy Policy
Copyright © 2020 The iTeam.ca | All Rights Reserved
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OK

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refuseing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Accept settingsHide notification only