• Skip to primary navigation
  • Skip to main content
Core Information Technologies Ltd.

Core Information Technologies Ltd.

Managed IT Services

  • Home
  • Cyber Security
  • Services
    • Data Backup & Recovery
    • IT Support
    • Managed IT Services
  • About Us
  • Contact Us
  • Portals
    • Remote Support
    • Invoice Payment
    • Shared Files
    • KB Login
    • Core IT’s Blog
  • Show Search
Hide Search

Core IT’s Blog

Tech agility: A must-have for crisis survival

Joshua White · June 28, 2022 ·

Tech agility: A must-have for crisis survival

It is a known fact that survival of any species depends on its ability to adapt to change. One major change for businesses in 2020 was the need to switch to the work-from-home model to keep things running during the time of pandemic. When countries all over the world started imposing lockdown restrictions, companies had no choice but to switch to remote operations if their line of business allowed them to do so. This blog post discusses the key challenges faced by businesses that had failed to adopt the latest technology on time.

Access to critical data and applications

For businesses that didn’t store their key data and applications in the cloud, this was a huge challenge. How do you ensure each of your employees have access to all the business data, programs and apps they need to operate efficiently? Companies that had already adopted the cloud as their core data storage means they didn’t face this challenge: everything was cloud-based and accessible from anywhere, using any internet enabled device (laptops/PCs/tablets/smartphones, etc., )

Cybersecurity concerns

With employees working from home, businesses’ fears of cybersecurity incidents were increased. Cybercriminals, on the other hand, knew full well all the security lacunae that existed in a hurried remote working environment setup and exploited them to the fullest. Industry reports showed that the initial few months of the pandemic saw an increase in cybercrime and related attacks on businesses.

Data loss

For businesses that didn’t operate in the cloud, data loss was another angle to look into. How do you ensure data backup and recovery when your staff is using their personal devices for work? Also, how to ensure they are taking all the precautions necessary to keep the data they are storing on their devices, safe?

Hardware issues

Some businesses provided their employees with work devices at home. For example, employees in some companies were allowed to take their office computers home for work use. But, that still didn’t solve the backup and recovery or cybersecurity challenges entirely, because the management still lacked ways to maintain control over the devices.

Phones

With employees working from home, it was a challenge for many businesses to manage their phone numbers–especially for client facing employees. Businesses with VoIP phone systems could make this transition easily, whereas those still relying on the traditional phone setup had to resort to cell phones and couldn’t use their business numbers for a while.

Key lesson: Move with the times, adopt new technologies, adapt to newer ways of working

WFH means more vulnerability to cybercrime

Joshua White · June 23, 2022 ·

WFH means more vulnerability to cybercrime. Here are some methods to stay safe

WFH opens up whole new horizons in terms of flexibility, productivity, and cost savings. But, it also opens your business up a little more to cybercriminals, as you can’t have a hands-on approach to cybersecurity, especially if your employees are using their own devices for work. This blog discusses some mechanisms that you can use to mitigate the risks of becoming a victim of cybercrime in the WFH setup.

Multi-factor authentication

Instead of using a single password for data access, multi-factor authentication adds more layers to security. If WFH has your employees accessing their work computers remotely, then you simply cannot skip multifactor authentication. Multi-factor authentication works by confirming the identity of the user across 3 areas

  1. What they know: Examples include asking for User IDs, passwords, answers to ‘secret questions’, verification of their date of birth, etc.
  2. What they have: This includes physical tokens, access cards, OTPs sent via text or email, etc.
  3. Who they are: This authentication mechanism includes biometric authentication such as retina scan, fingerprint, or voice recognition.

While the 3rd kind of authentication (who they are) may not be easy to implement in a WFH scenario, you can still use multi-factor authentication to include the first 2 options.

The Cloud

Using the Cloud to store your files presents a lot of advantages in the WFH environment. It certainly saves time and effort as files don’t have to be mailed back and forth, eliminates version control challenges, and ensures timely access to data. But, did you know that you can also leverage the Cloud to thwart security threats presented by the WFH scenario? The Cloud lets your employees work safely from anywhere and offers more safety than local data storage mechanisms. Any data in the Cloud is encrypted, which means it is not that easy to access confidential information as it would be when someone hacks a PC. Plus, the chances of data loss are almost zero. Unlike your employees storing work files on their computer, which can be lost or misused if their device malfunctions or is stolen or hacked into, any data put on the Cloud stays there.

Employee Training

Did you know that lack of knowledge is one of the major reasons behind companies and individuals becoming victims of cybercrime? All it takes is one wrong click to open the floodgates, and the only way to stop that from happening is to train your employees on cybersecurity best practices. Training will not only provide them with a clear set of do’s and don’ts but also help them identify situations where they may be a possible target. Training on cybersecurity best practices can cover a wide range of topics, but here are a few that should not be missedPassword hygiene

    • What does a good password look like?
    • Why is password sharing an absolute no-no?
  • How to identify phishing attempts?
  • Why is it important to install software updates and patches on a timely basis
  • Data storage best practices
  • The risks associated with public WiFi such as those at malls, coffee shops, or airports

You can also conduct mock drills and check who grasped these concepts right and who needs further training.

An experienced MSP can help you overcome the cybersecurity challenges propelled by the WFH scenario. They can put your mind at ease by taking care of everything–from anti-malware solutions to employee training, and beyond.

Is it time to upgrade to Windows 11?

Joshua White · June 21, 2022 ·

Is it time to upgrade to Windows 11?

You’ve probably noticed that Microsoft has released their Windows 11 operating system and have been encouraging people to upgrade. Core IT recommends that you avoid upgrading to Windows 11 at this time and continue using Windows 10.

There are a few key reasons why we are making this recommendation:

  • Some key features that users depend on are missing or haven’t been full integrated into the new operating system
  • Some applications you depend on may behave unexpectedly if they haven’t yet been updated to work with Windows 11
  • Issues exist with some Microsoft applications, breaking some common functionality
  • Windows 11 isn’t stable it’s current form; users report bugs, stuttering, and lag in some areas and menus
  • Settings for default applications are not always retained (web browser, email viewer, pdf viewer, etc.) and may revert to the default applications set by Windows

To help prevent our Managed Services customers from accidentally updating we have put measures in place to stop the update from appearing on managed computers.

Once Windows 11 has become a well-tested, stable operating system, we will begin moving away from Windows 10. Microsoft will continue to fully support Windows 10 through fall of 2025.

For now, if you are being prompted by your computer to update to Windows 11, please disregard and remain on Windows 10. If you’re keen to try out the new operating system, please reach out to us prior to upgrading so we can assess the situation and anticipate any issues you may face.

We will keep you updated on any changes with our recommendations regarding Windows 11. If you have any questions about upgrading your operating system, please reach out to us at support@coreit.ca or (604) 632-4110.

Data security in a WFH setup

Joshua White · June 16, 2022 ·

Data security in a WFH setup

Do you have staff working from home? With the pandemic still around, the answer to that question is most likely a “Yes”. And, that makes sense too, why risk the safety of your staff when you can operate equally well or even better with them working from the safety of their homes. But, did you know that the WFH model can put your data at risk? When you have your employees work remotely, inadvertently your data is more vulnerable to cybercrimes. However, there are solutions that help ensure the WFH environment is safe–for both your employees and your data. Let’s take a look at 2 of the most recommended ones.

Anti-malware tools

Any discussion about data security has to start with anti-malware applications. These applications keep your computers safe from viruses, worms, adware, and other malware. When your employees are working remotely, they are most likely to use their own devices such as their laptops or the desktop computers at their home. Plus, with the working schedules blurring, and the trend to “be there ” 24/7 catching on, personal devices used for work include smartphones and tablets as well. It could so happen that your employee’s devices are not up-to-date on the latest anti-malware software. These software programs do not come cheap and so your employees may not have them at all or maybe using an outdated or free version of the tool, which may not be of much help. So, one of the first things you should do as a company is to provide the latest version of powerful anti-malware software to your staff to install on their devices. Again, if they are using personal devices, you may not be able to make this mandatory, but considering it safeguards their private data as well, most will happily take advantage of this offer.

Firewalls

Firewalls protect your data by monitoring network traffic and allowing/blocking data exchange based on preset rules. For example, a firewall lets you dictate what websites can or cannot be accessed from a particular device, or what software programs may be installed, etc. Sounds great, doesn’t it? Using a firewall you can weed out the risk of your employees compromising your data security unwittingly by visiting unsecured places on the web. Firewalls also generate alerts for the system administrator if there’s an attempted breach. For example, someone tries to visit a site that has been firewalled. But, there’s a caveat. You can only install a firewall on company property, that is, if you are providing your employees with laptops or desktops to use for work purposes. You can’t Firewall your employee’s devices that they are using to access work files when operating from home.

As you can see, deploying data security software in a WFH environment can be tricky. Consult with an MSP who specializes in cybersecurity, data protection, recovery and backup to learn what are your options and how best to implement them.

What’s your argument against an SLA with an MSP? Part-1

Joshua White · June 7, 2022 ·

What’s your argument against an SLA with an MSP? (And why it doesn’t hold water) Part-1

Managed IT services are becoming more popular by the day. Businesses, big and small, are bringing managed service providers onboard to handle their IT requirements. The bigger IT players like IBM, Accenture, CISCO act as MSPs to larger organizations, while the typical managed service provider is often hired by SMBs. However, there’s a question that crops up time and again–Do SMBs really need an MSP? SMBs are sometimes in two minds when it comes to bringing an MSP on board and typically use one of the following justifications.

Our IT requirements are limited

A lot of businesses in the small to mid-size range believe that their IT needs don’t warrant a full-time service level agreement with an MSP. They believe the only times they need to invest in IT is at the start of their business or when rolling out new technology. As a result, they don’t see much value in signing a service level agreement with an MSP.

We are tight on budget

SMBs also tend to cut on the IT budget and invest those funds elsewhere–generally in areas where they see tangible results, such as hiring new customer-facing staff or a new advertising campaign. So, when SMBs find themselves a little tight on the budget, the IT department sees the cut.

We have our in-house IT person/team

Businesses with an in-house IT expert or even a small in-house IT team feel that is sufficient for handling any IT needs and an SLA is just an added expenditure.

So, did your reason make it to the list? Stay tuned for our next blog post, where we will discuss how an SLA with a managed service provider can add value to your business.

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Interim pages omitted …
  • Page 18
  • Go to Next Page »

Core Information Technologies Ltd.

Copyright © 2025 · Core Information Technologies Ltd. · Log in