Overview: Cyber criminals seek the easiest path to a pay day, often targeting small and medium-sized...
The Essentials Guide to Addressing your Cybersecurity [Download Guide]
Overview: understanding the cybersecurity essentials that are needed for your business is critical. This guide...
Calling For Hardware Donations
For years, CTECH has been a proud partner of the Calgary Drop-In Center: Free Goods Program. Last year, the DI...
Introducing the Microsoft Teams Schedule Send Feature
Introducing the Microsoft Teams Schedule Send Feature Key Points Microsoft Teams will introduce a new feature in...
Small Business Guide To Microsoft Azure Virtual Desktop
Small Business Guide To Microsoft Azure Virtual Desktop The business world is becoming increasingly digital....
Cardiologist Turns Hacker
Cardiologist Turns Hacker – Moises Luis Zagala Gonzalez Moises Luis Zagala Gonzalez, a cardiologist in Venezuela,...
6 Timely Tips To Help Businesses Avoid Phishing Emails
6 Timely Tips To Help Businesses Avoid Phishing Emails Phishing emails are a common way for cybercriminals to...
157-Year-Old Lincoln College Succumbed To A Ransomware Attack
157-Year-Old Lincoln College Succumbed To A Ransomware Attack On May 13th, 2022, a college that has remained open...
Zero Trust Networks: What Are They?
Zero Trust Networks: What Are They? The internet has brought a world of opportunity for businesses. It is easy...
Can Ransomware Spread Through Business WiFi Networks?
Can Ransomware Spread Through WiFi? Ransomware has been a menace to businesses large and small for years, and the...
Network Equipment Shortages
Network Equipment Shortages The current state of microchips for network equipment is difficult at best, depending...
Slack vs. Microsoft Teams
Slack vs. Microsoft Teams Chat-based collaboration has been around for several years, but with the sudden impact...