Home

    About Us

    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Refer a Colleague or Friend

    IT Services

    • Managed IT Services
      • Why Managed IT Service
      • IT Consulting
      • IT Support – Helpdesk Services
      • Remote Monitoring and Maintenance
      • Co-Managed IT
      • Infrastructure Support Services
      • Professional Server Support
      • Understanding IT
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Spam Protection
      • Sophos Security Solutions
      • Email Encryption
      • Cisco-Certified Solutions
      • Security Networking
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Microsoft Exchange
      • Hosted Server
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Managed WordPress Hosting
    • Industry Specific
      • Health Care IT
      • Electronic Medical Records
      • IT for Law
      • IT for Education
      • IT for Accountants
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Disaster Recovery as a Service
      • Compusync Backup
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Lenovo Official Reseller
      • Server Migration
      • SensorGnome
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • Fax Server

    Blog

    Contact Us

    Support

logo

1-855-405-8889

  • Home
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Why Managed IT Service
      • IT Consulting
      • IT Support – Helpdesk Services
      • Remote Monitoring and Maintenance
      • Co-Managed IT
      • Infrastructure Support Services
      • Professional Server Support
      • Understanding IT
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Spam Protection
      • Sophos Security Solutions
      • Email Encryption
      • Cisco-Certified Solutions
      • Security Networking
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Microsoft Exchange
      • Hosted Server
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Managed WordPress Hosting
    • Industry Specific
      • Health Care IT
      • Electronic Medical Records
      • IT for Law
      • IT for Education
      • IT for Accountants
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Disaster Recovery as a Service
      • Compusync Backup
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Lenovo Official Reseller
      • Server Migration
      • SensorGnome
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • Fax Server
  • Blog
  • Contact Us
  • Support

Social Media Can Be a Great Business Tool, So Long as It’s Secured

Written by Compudata
Published: 01 Mar 2019
Social Media Can Be a Great Business Tool, So Long as It’s Secured

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

There is no denying that social media is one of the most powerful communication tools of our time, especially for businesses trying to communicate with their clients and customers. However, while you will want to have an account for your business on social media, you might not want a presence of your own. Today, we’ll

Read more...  Comments Off on Social Media Can Be a Great Business Tool, So Long as It’s Secured 

Posted in Best practices  
Tagged Communication, Security, Social Media  

 

The Right and Wrong of the Hollywood Hack

Written by Compudata
Published: 22 Feb 2019
The Right and Wrong of the Hollywood Hack

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

Movies and television shows are a big part of our culture. When hackers are portrayed on the silver (or small) screen, there are some major dramatic elements added to their performances to keep the audience from dismissing key pieces of plot. Today, we will look at hacker portrayals, and what Hollywood gets right, and what

Read more...  Comments Off on The Right and Wrong of the Hollywood Hack 

Posted in Miscellaneous  
Tagged Entertainment, Hackers, Security  

 

How Retail is Starting to Need IT

Written by Compudata
Published: 15 Feb 2019
How Retail is Starting to Need IT

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

Of all industries, retail has probably escaped the dependence on technology that many others have developed over the years for the longest span of time. However, it has become clear that there are many ways that IT solutions can assist the retail sector that just weren’t present in the past. However, this shift is proving

Read more...  Comments Off on How Retail is Starting to Need IT 

Posted in Business  
Tagged Business Computing, Retail, Security  

 

Social engineering: the go to method for hackers

Published: 08 Feb 2019
Social engineering: the go to method for hackers

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

Social engineering attacks are happening every day, and it is often the first technique hackers turn to, because “calling somebody on the phone is so much easier than doing the technical magic you need to break into a computer.”   Is your name and your phone number all it takes for a hacker to take

Read more... 

Posted in Blog, Security, Technology  
Tagged Cybersecurity, Security, Technology  
 

Cybersecurity outlook for 2019

Published: 08 Feb 2019
Cybersecurity outlook for 2019

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

We all know data is valuable, but too often we act as if it isn’t. Valuables are often secured – kept in safes, insured, treated with care. With valuable business and personal data moving around the internet all the time, criminals are always looking for new ways to steal, copy and subvert this precious new

Read more... 

Posted in Blog, Business, News and Events, Security, Technology  
Tagged Cybersecurity, Security, Technology  
 

An MSP’s Services Protect More than Digital Assets

Written by Compudata
Published: 31 Dec 2018
An MSP’s Services Protect More than Digital Assets

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

When you think about your data security, what kind of solutions pop into mind? If you’re like many, you probably start thinking about passwords, firewalls, and antivirus, right? While these are all good things to have, you also have to consider the possibility that someone could break into your office and bypass all of these

Read more...  Comments Off on An MSP’s Services Protect More than Digital Assets 

Posted in Security  
Tagged Best practices, Information, Security  

 

One Phish, Two Phish, The Grinch Who Didn’t Phish

Written by Compudata
Published: 24 Dec 2018
One Phish, Two Phish, The Grinch Who Didn’t Phish

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

An email’s important, that much is clear fact – but you need to stay safe from an email attack.

Read more...  Comments Off on One Phish, Two Phish, The Grinch Who Didn’t Phish 

Posted in Security  
Tagged Email, Hacker, Security  

 

Securing Your Google Account: The Unofficial Guide

Written by Compudata
Published: 21 Dec 2018
Securing Your Google Account: The Unofficial Guide

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

If you use a computer today, there’s a fair chance that you have a Google account. The practicality that if offers with its comprehensive service offerings simply can’t be ignored. However, it is also important that a user’s, whether they utilize it for business or personal use, security isn’t ignored either.

Read more...  Comments Off on Securing Your Google Account: The Unofficial Guide 

Posted in Security  
Tagged Best practices, Google, Security  

 

Marriott reveals data breach of 500 million Starwood guests

Published: 30 Nov 2018
Marriott reveals data breach of 500 million Starwood guests

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

[et_pb_section bb_built=”1″][et_pb_row][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.17.6″] For 327 million people, Marriott says the guests’ exposed information includes their names, phone numbers, email addresses, passport numbers, date of birth and arrival and departure information. For millions others, their credit card numbers and card expiration dates were potentially compromised

Read more... 

Posted in Alerts, Blog, News and Events, Security, Technology  
Tagged Privacy, Security, Technology  
 

New privacy rules will force Canadian companies to disclose data breaches

Published: 02 Nov 2018

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

New privacy rules designed to better safeguard the personal data of Canadians and let them know when it has been breached take effect November 1, 2018, but even security experts say they are far from perfect. The legislation, known as the Personal Information Protection and Electronic Documents Act (or PIPEDA) do a lot of things, but

Read more...  Comments Off on New privacy rules will force Canadian companies to disclose data breaches 

Posted in Blog, Business, News and Events, Security, Technology  
Tagged Cybersecurity, Security, Technology  

 

Page 24 of 25

StartPrev 123456789101112131415161718192021222324 25 NextEnd
Home > Archives for > Page 24

Latest Blog

Combating Cybersecurity Apathy in the Workplace

May 7, 2025 8:30 am | By Compudata

We've all seen or experienced the exasperation when another cybersecurity memo lands in the inbox. Perhaps it's accompanied by a quiet groan. Who cares? While it might seem like a minor annoyance, this attitude towards cybersecurity is more than just frustrating; it's a digital pathogen that can quietly infect your entire organization, leaving it vulnerable in ways you might not... Read More

Contact Us

Learn more about what Compudata can do for your business.

1-855-405-8889

Compudata
4-85 Midpark Rd
London, Ontario N6N 1B2

twitter RSS feed

About Compudata

Compudata strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges, starting with planning, implementing, and supporting the IT solutions that are critical to your growth and success.
About Us

Navigation

  • Catalog
  • Sitemap
  • Understanding IT
  • Privacy Policy
  • Accessibility Policy
Remote Support Tool

Trust

Consumer Choice Award Winner
© Compudata Systems London Inc — "Defining What IT Can Be Since 1995."

S5 Box – Login

Publish a login form or anything you want to this position.

S5 Box – Register

Publish a registration form or anything you want to this position.