Blog

An easy way to keep yourself up-to-date on the latest toys, technology, and threats.

Banner Accent
Created with Sketch.

Getting to Know Greenshot (Video): a Free Screenshot Software for PCs

Posted 09 Dec 2019 in New Technology & Toys, Pro-Tips & How-To

As part of our new approach to Managed IT Services and the launch of SIRKit Pods, we've launched our video tutorial series called SIRKit Trail Markers. Our goal for Trail Markers is to provide helpful how-to tips and training for our clients, on tech we use on a regular basis. Today's video is going to help you get to know Greenshot, a free screenshot tool for PCs.

Read More

Introducing SIRKit Pods - Managed IT Services Done Better

Posted 27 Nov 2019 in IT Security & Advisories, SIRKit Live

SIRKit is excited to announce the launch of Pods, a system that pairs the experience and skill set of a large team with the personal touch of a small managed IT support team. Pods were born from many conversations with client prospects. It became clear that the challenges facing business leaders who retain IT companies or resources were common regardless of size, industry, complexity and support needs. If any of the following scenarios are familiar to you, you need SIRKit Pods.

Read More

Event: SIRKit Summit Base Camp - Microsoft Teams Live Events

Posted 13 Nov 2019 in New Technology & Toys, Pro-Tips & How-To, SIRKit Live, Technical Solutions & Fixes

Our first Base Camp presentation will be on Microsoft Teams Live Events: Reaching a wider audience, Nov 15th at 4:30pm. Where: SIRKit’s office - Unit 217, 236 - 91 Street SW, Edmonton. If you’ve recently started using Microsoft Teams and have not yet explored the Live Events feature, this presentation is a must-attend!

Read More

5 Most Vulnerable IoT Devices in Your Office 2020

Posted 28 Aug 2019

Companies are finally coming around when it comes to investing in better cyber security. They are securing email and computers, subscribing to more secure software, and backing up data to the cloud. But one concerning area is often overlooked, the internet-of-things (IoT) devices used in the office environment. All of the digital bells and whistles that intend to improve both productivity and quality of life in the workplace are modern gateways to cyber criminals. When compromised, hackers may be able to gain access to your entire network. Below we have detailed the most vulnerable devices so that you can assess your business risk and take action. Here are 5 IoT Devices in your place of business that are being targeted by Cyber Criminals and what you need to do.

Read More

Computer Security Tips for the Workplace

Posted 15 Aug 2019 in IT Security & Advisories

Computer security in a corporate environment is concerned with the security of physical computers (desktops, laptops, mobile devices) and installed software. It’s only one component of cyber security, which is concerned with the entire network, but it absolutely requires your attention. Today, we’re going to look exclusively at your hardware so that you can block yet another cyber crime gateway to your IT systems.

Read More

How Microsoft’s Response to Canadian Election Concerns Speak to Their Value for Your Business

Posted 31 Jul 2019 in IT Security & Advisories

Canadian Minister of Justice David Lametti recently admitted that he is losing sleep over data privacy and 2019 federal election interference in Canada. Days later, Democratic Institutions Minister Karina Gould announced the Canada Declaration on Electoral Integrity Online before an international committee of politicians in Ottawa. The declaration is as it sounds, and takes aim at figuring out how best to protect citizens’ data privacy and democratic fairness in light of all that befell elections across the border on a fateful tail end of 2016. Governing bodies are calling upon tech giants (Facebook, Google, Twitter, Microsoft, Amazon, Mozilla, etc.) operating in Canada to sign onto the declaration on electoral integrity, and yet to date not all have followed suit. Microsoft, however, has shown leadership by signing on.

Read More

Tech Talent Shortage in Canada and Why Businesses Are Turning to Outside IT Support

Posted 10 Jul 2019

Like the looming oil and gas issues in Canada, there’s a different kind of crisis that is costing Canadian companies hundreds of thousands of dollars or more per year - tech talent. TechVibes reports that 2019 is the year that our country’s tech talent shortage will manifest itself across all levels of business. Studies find that local organizations are especially concerned about the invasion of foreign tech companies (Amazon, Microsoft, Samsung, Uber, etc.) who are armed with enterprise budgets to scoop up what limited talent supply there is. SMBs simply can’t compete. The inevitable rise of digital transformation across all industries may make businesses more efficient in theory, but when the human resources aren’t in place to power it, opportunities quickly become threats and strengths become weaknesses. Today, we’re going to look at how the tech labour crisis affects your business, what your next course of action should be.

Read More

Top 5 Phishing Targets Your Organization Needs to Protect

Posted 27 Jun 2019 in IT Security & Advisories

Phishing surpassed ransomware attacks for the first time last year, and now shares the throne as a top cyber security threat to businesses to watch out for in 2019. While it’s an organization-wide concern, evidence shows that there are certain individuals and departments that have bigger bullseyes painted on them. And as you might suspect, Phishers are going after them in droves in order to access sensitive data and/or inject malware. Today, we are identifying these top targets so that you can recognize human resource vulnerabilities and take preventative action.

Read More

3 Recent Cyber Attacks on Canadian Soil ~ A Wake Up Call for Your Business

Posted 13 Jun 2019 in IT Security & Advisories

In April of 2019, IT World Canada reported that despite the awareness of IT security risks, most Canadian organizations remain unprepared for a cyber incident, with 74% stating that they do not have a response plan that is applied consistently across their entire company. Among the organizations that do have a plan, 59% admit to not testing them regularly, or at all. It seems that press releases and statistical reports have little to no impact on corporate decision makers, which is why it’s important to look at current and tangible examples of attacks that have occurred on our own soil. From these attacks, we hope that you draw the clear conclusion that now is the time to take action to prevent the same from happening to your company.

Read More

Why Your Business Needs Cyber-Security Insurance Too

Posted 24 May 2019 in IT Security & Advisories

Cyber crime prevention has headlined many articles in our blog, and for good reason given that the threat level is higher than ever. While a Managed Services Provider can protect you with enterprise level security solutions, another important layer of risk mitigation to consider is cyber-security insurance. Here's why.

Read More
1 2 3 4
© 2019 Sirkit. All Rights Reserved.