Home

    About Us

    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Refer a Colleague or Friend

    IT Services

    • Managed IT Services
      • Why Managed IT Service
      • IT Consulting
      • IT Support – Helpdesk Services
      • Remote Monitoring and Maintenance
      • Co-Managed IT
      • Infrastructure Support Services
      • Professional Server Support
      • Understanding IT
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Spam Protection
      • Sophos Security Solutions
      • Email Encryption
      • Cisco-Certified Solutions
      • Security Networking
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Microsoft Exchange
      • Hosted Server
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Managed WordPress Hosting
    • Industry Specific
      • Health Care IT
      • Electronic Medical Records
      • IT for Law
      • IT for Education
      • IT for Accountants
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Disaster Recovery as a Service
      • Compusync Backup
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Lenovo Official Reseller
      • Server Migration
      • SensorGnome
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • Fax Server

    Blog

    Contact Us

    Support

logo

1-855-405-8889

  • Home
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Why Managed IT Service
      • IT Consulting
      • IT Support – Helpdesk Services
      • Remote Monitoring and Maintenance
      • Co-Managed IT
      • Infrastructure Support Services
      • Professional Server Support
      • Understanding IT
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Spam Protection
      • Sophos Security Solutions
      • Email Encryption
      • Cisco-Certified Solutions
      • Security Networking
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Microsoft Exchange
      • Hosted Server
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Managed WordPress Hosting
    • Industry Specific
      • Health Care IT
      • Electronic Medical Records
      • IT for Law
      • IT for Education
      • IT for Accountants
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Disaster Recovery as a Service
      • Compusync Backup
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Lenovo Official Reseller
      • Server Migration
      • SensorGnome
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • Fax Server
  • Blog
  • Contact Us
  • Support

Securing Your Google Account: The Unofficial Guide

Written by Compudata
Published: 21 Dec 2018
Securing Your Google Account: The Unofficial Guide

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

If you use a computer today, there’s a fair chance that you have a Google account. The practicality that if offers with its comprehensive service offerings simply can’t be ignored. However, it is also important that a user’s, whether they utilize it for business or personal use, security isn’t ignored either.

Read more...  Comments Off on Securing Your Google Account: The Unofficial Guide 

Posted in Security  
Tagged Best practices, Google, Security  

 

Marriott reveals data breach of 500 million Starwood guests

Published: 30 Nov 2018
Marriott reveals data breach of 500 million Starwood guests

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

[et_pb_section bb_built=”1″][et_pb_row][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.17.6″] For 327 million people, Marriott says the guests’ exposed information includes their names, phone numbers, email addresses, passport numbers, date of birth and arrival and departure information. For millions others, their credit card numbers and card expiration dates were potentially compromised

Read more... 

Posted in Alerts, Blog, News and Events, Security, Technology  
Tagged Privacy, Security, Technology  
 

New privacy rules will force Canadian companies to disclose data breaches

Published: 02 Nov 2018

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

New privacy rules designed to better safeguard the personal data of Canadians and let them know when it has been breached take effect November 1, 2018, but even security experts say they are far from perfect. The legislation, known as the Personal Information Protection and Electronic Documents Act (or PIPEDA) do a lot of things, but

Read more...  Comments Off on New privacy rules will force Canadian companies to disclose data breaches 

Posted in Blog, Business, News and Events, Security, Technology  
Tagged Cybersecurity, Security, Technology  

 

Why You Should Be Encrypting Your Emails

Written by Compudata
Published: 02 Nov 2018
Why You Should Be Encrypting Your Emails

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

Encryption can be an invaluable tool for your company, especially where your email communications are concerned. Here, we’ll go over a few of the benefits you can see by adopting it – but first, we’ll briefly go over what encryption is.

Read more...  Comments Off on Why You Should Be Encrypting Your Emails 

Posted in Blog  
Tagged Communication, Email, Security  

 

Fileless Ransomware Uses Windows Tools Against You

Written by Compudata
Published: 19 Oct 2018
Fileless Ransomware Uses Windows Tools Against You

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

By now everyone knows about ransomware, the dastardly strand of malware that encrypts data (or the drives it’s stored on) and sends the user a message demanding payment in a certain amount of time before the data is deleted forever. To add a little more menace to an already stressful situation, the message includes a

Read more...  Comments Off on Fileless Ransomware Uses Windows Tools Against You 

Posted in Security  
Tagged Data, Ransomware, Security  

 

Windows Set to Launch Huge Update in October

Written by Compudata
Published: 08 Oct 2018
Windows Set to Launch Huge Update in October

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

Windows 10 might be one of the best Microsoft operating systems to come out in a while, but their latest policy regarding dominant Windows 10 updates is causing quite a stir in the technology industry. Specifically, the massive update coming up this October could potentially cause significant problems for your organization.

Read more...  Comments Off on Windows Set to Launch Huge Update in October 

Posted in Technology  
Tagged Security, Update, Windows 10  

 

Swiss Chalet, Harvey’s and other big chain restaurants hit by ‘malware outbreak’

Published: 03 Oct 2018

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

Recipe Unlimited — formerly Cara Operations — said certain restaurants under the brands Swiss Chalet, Harvey’s, Milestones, Kelsey’s, Montana’s, Bier Markt, East Side Mario’s, The Landing Group of Restaurants and Prime Pubs brands have been affected. As a result, some locations have temporarily closed while others are offering reduced services such as no debit and

Read more...  Comments Off on Swiss Chalet, Harvey’s and other big chain restaurants hit by ‘malware outbreak’ 

Posted in Blog, News and Events, Security  
Tagged Computer, Security, Upgrade  

 

How Safe is Your Email?

Written by Ian Snider
Published: 02 Feb 2018
How Safe is Your Email?

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Ontario small businesses that only do business locally are at risk of these issues. Personal email accounts

Read more...  Comments Off on How Safe is Your Email? 

Posted in Blog, IT Blog  
Tagged Email, Privacy, Security  

 

What is your Identity Worth to You?

Written by Ian Snider
Published: 30 Dec 2017
What is your Identity Worth to You?

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let’s talk about a few of these statistics and what it means.

Read more...  Comments Off on What is your Identity Worth to You? 

Posted in Blog, IT Blog  
Tagged Passwords, Privacy, Security  

 

Page 25 of 25

StartPrev 12345678910111213141516171819202122232425 NextEnd
Home > Archives for > Page 25

Latest Blog

Key IT Practices for Business Compliance & Protection

May 30, 2025 8:30 am | By Compudata

There are many rules businesses need to follow. These rules help your business and also protect your clients and customers. Think of rules like HIPAA or PCI DSS. These are well-known and important. These mandates just point out basic things every business should already be doing to stay secure and work well. Let’s take a look at some things you... Read More

Contact Us

Learn more about what Compudata can do for your business.

1-855-405-8889

Compudata
4-85 Midpark Rd
London, Ontario N6N 1B2

twitter RSS feed

About Compudata

Compudata strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges, starting with planning, implementing, and supporting the IT solutions that are critical to your growth and success.
About Us

Navigation

  • Catalog
  • Sitemap
  • Understanding IT
  • Privacy Policy
  • Accessibility Policy
Remote Support Tool

Trust

Consumer Choice Award Winner
© Compudata Systems London Inc — "Defining What IT Can Be Since 1995."

S5 Box – Login

Publish a login form or anything you want to this position.

S5 Box – Register

Publish a registration form or anything you want to this position.