Array
(
    [1536x1536] => Array
        (
            [width] => 1536
            [height] => 1536
            [crop] => 
        )

    [2048x2048] => Array
        (
            [width] => 2048
            [height] => 2048
            [crop] => 
        )

    [rta_thumb_no_cropped_420x] => Array
        (
            [width] => 420
            [height] => 0
            [crop] => 
        )

    [et-pb-gallery-module-image-portrait] => Array
        (
            [width] => 400
            [height] => 300
            [crop] => 1
        )

    [et-pb-post-main-image-fullwidth-large] => Array
        (
            [width] => 0
            [height] => 0
            [crop] => 1
        )

    [et-pb-image--responsive--desktop] => Array
        (
            [width] => 1280
            [height] => 720
            [crop] => 1
        )

    [et-pb-image--responsive--tablet] => Array
        (
            [width] => 980
            [height] => 551
            [crop] => 1
        )

    [et-pb-image--responsive--phone] => Array
        (
            [width] => 480
            [height] => 270
            [crop] => 1
        )

)

Top 5 Data Protection Benefits of Cloud Computing

Top 5 Data Protection Benefits of Cloud Computing

Top 5 Data Protection Benefits of Cloud Computing. Speak With Our Awesome IT Experts Now Ready To Take Microsoft Office 365 Out For A Spin? Let CTECH Be Your Professional Office 365 Guide. Sign Up For A Free Demo Of Microsoft’s Powerful Cloud Application. Your...
Discover More
Understanding the Reality of Canada’s IT Skills

Understanding the Reality of Canada’s IT Skills

As the owner of an IT company, I come across a variety of people who have different skills in the tech industry. Because technology touches so many parts of our lives, it’s impossible for even the experts to know about every new innovation on the market. However,...
Discover More
Ransomware an Expensive Problem for Everyone

Ransomware an Expensive Problem for Everyone

Major news sites have been exploited by hackers using a malware exploit package known as the “Angle exploit kit.” Some of the targeted sites include The New York Times, BBC, Newsweek, AOL, MSN, The Hill, and the Guardian. A bit of dark humor is in that one of the...
Discover More
Spear-Phishing: A Hacker’s Best Friend

Spear-Phishing: A Hacker’s Best Friend

Hackers are an ever-present security concern. They’ve hacked the U.S. federal government and Fortune 500 companies, but they don’t turn up their noses at small and medium-sized businesses. If you’ve turned on the news any time within the past few years, you probably...
Discover More