Home

    About Us

    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Refer a Colleague or Friend

    IT Services

    • Managed IT Services
      • Why Managed IT Service
      • IT Consulting
      • IT Support – Helpdesk Services
      • Remote Monitoring and Maintenance
      • Co-Managed IT
      • Infrastructure Support Services
      • Professional Server Support
      • Understanding IT
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Spam Protection
      • Sophos Security Solutions
      • Email Encryption
      • Cisco-Certified Solutions
      • Security Networking
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Microsoft Exchange
      • Hosted Server
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Managed WordPress Hosting
    • Industry Specific
      • Health Care IT
      • Electronic Medical Records
      • IT for Law
      • IT for Education
      • IT for Accountants
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Disaster Recovery as a Service
      • Compusync Backup
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Lenovo Official Reseller
      • Server Migration
      • SensorGnome
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • Fax Server

    Blog

    Contact Us

    Support

logo

1-855-405-8889

  • Home
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Why Managed IT Service
      • IT Consulting
      • IT Support – Helpdesk Services
      • Remote Monitoring and Maintenance
      • Co-Managed IT
      • Infrastructure Support Services
      • Professional Server Support
      • Understanding IT
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Spam Protection
      • Sophos Security Solutions
      • Email Encryption
      • Cisco-Certified Solutions
      • Security Networking
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Microsoft Exchange
      • Hosted Server
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Managed WordPress Hosting
    • Industry Specific
      • Health Care IT
      • Electronic Medical Records
      • IT for Law
      • IT for Education
      • IT for Accountants
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Disaster Recovery as a Service
      • Compusync Backup
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Lenovo Official Reseller
      • Server Migration
      • SensorGnome
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • Fax Server
  • Blog
  • Contact Us
  • Support

Social engineering: the go to method for hackers

Published: 08 Feb 2019
Social engineering: the go to method for hackers

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

Social engineering attacks are happening every day, and it is often the first technique hackers turn to, because “calling somebody on the phone is so much easier than doing the technical magic you need to break into a computer.”   Is your name and your phone number all it takes for a hacker to take

Read more... 

Posted in Blog, Security, Technology  
Tagged Cybersecurity, Security, Technology  
 

Cybersecurity outlook for 2019

Published: 08 Feb 2019
Cybersecurity outlook for 2019

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

We all know data is valuable, but too often we act as if it isn’t. Valuables are often secured – kept in safes, insured, treated with care. With valuable business and personal data moving around the internet all the time, criminals are always looking for new ways to steal, copy and subvert this precious new

Read more... 

Posted in Blog, Business, News and Events, Security, Technology  
Tagged Cybersecurity, Security, Technology  
 

An MSP’s Services Protect More than Digital Assets

Written by Compudata
Published: 31 Dec 2018
An MSP’s Services Protect More than Digital Assets

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

When you think about your data security, what kind of solutions pop into mind? If you’re like many, you probably start thinking about passwords, firewalls, and antivirus, right? While these are all good things to have, you also have to consider the possibility that someone could break into your office and bypass all of these

Read more...  Comments Off on An MSP’s Services Protect More than Digital Assets 

Posted in Security  
Tagged Best practices, Information, Security  

 

One Phish, Two Phish, The Grinch Who Didn’t Phish

Written by Compudata
Published: 24 Dec 2018
One Phish, Two Phish, The Grinch Who Didn’t Phish

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

An email’s important, that much is clear fact – but you need to stay safe from an email attack.

Read more...  Comments Off on One Phish, Two Phish, The Grinch Who Didn’t Phish 

Posted in Security  
Tagged Email, Hacker, Security  

 

Securing Your Google Account: The Unofficial Guide

Written by Compudata
Published: 21 Dec 2018
Securing Your Google Account: The Unofficial Guide

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

If you use a computer today, there’s a fair chance that you have a Google account. The practicality that if offers with its comprehensive service offerings simply can’t be ignored. However, it is also important that a user’s, whether they utilize it for business or personal use, security isn’t ignored either.

Read more...  Comments Off on Securing Your Google Account: The Unofficial Guide 

Posted in Security  
Tagged Best practices, Google, Security  

 

Marriott reveals data breach of 500 million Starwood guests

Published: 30 Nov 2018
Marriott reveals data breach of 500 million Starwood guests

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

[et_pb_section bb_built=”1″][et_pb_row][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.17.6″] For 327 million people, Marriott says the guests’ exposed information includes their names, phone numbers, email addresses, passport numbers, date of birth and arrival and departure information. For millions others, their credit card numbers and card expiration dates were potentially compromised

Read more... 

Posted in Alerts, Blog, News and Events, Security, Technology  
Tagged Privacy, Security, Technology  
 

New privacy rules will force Canadian companies to disclose data breaches

Published: 02 Nov 2018

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

New privacy rules designed to better safeguard the personal data of Canadians and let them know when it has been breached take effect November 1, 2018, but even security experts say they are far from perfect. The legislation, known as the Personal Information Protection and Electronic Documents Act (or PIPEDA) do a lot of things, but

Read more...  Comments Off on New privacy rules will force Canadian companies to disclose data breaches 

Posted in Blog, Business, News and Events, Security, Technology  
Tagged Cybersecurity, Security, Technology  

 

Why You Should Be Encrypting Your Emails

Written by Compudata
Published: 02 Nov 2018
Why You Should Be Encrypting Your Emails

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

Encryption can be an invaluable tool for your company, especially where your email communications are concerned. Here, we’ll go over a few of the benefits you can see by adopting it – but first, we’ll briefly go over what encryption is.

Read more...  Comments Off on Why You Should Be Encrypting Your Emails 

Posted in Blog  
Tagged Communication, Email, Security  

 

Fileless Ransomware Uses Windows Tools Against You

Written by Compudata
Published: 19 Oct 2018
Fileless Ransomware Uses Windows Tools Against You

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

By now everyone knows about ransomware, the dastardly strand of malware that encrypts data (or the drives it’s stored on) and sends the user a message demanding payment in a certain amount of time before the data is deleted forever. To add a little more menace to an already stressful situation, the message includes a

Read more...  Comments Off on Fileless Ransomware Uses Windows Tools Against You 

Posted in Security  
Tagged Data, Ransomware, Security  

 

Windows Set to Launch Huge Update in October

Written by Compudata
Published: 08 Oct 2018
Windows Set to Launch Huge Update in October

If you are interested in content about the latest and greatest in security, here is the place to find the information you are looking for. Click to read more.

Windows 10 might be one of the best Microsoft operating systems to come out in a while, but their latest policy regarding dominant Windows 10 updates is causing quite a stir in the technology industry. Specifically, the massive update coming up this October could potentially cause significant problems for your organization.

Read more...  Comments Off on Windows Set to Launch Huge Update in October 

Posted in Technology  
Tagged Security, Update, Windows 10  

 

Page 25 of 26

StartPrev 12345678910111213141516171819202122232425 26 NextEnd
Home > Archives for > Page 25

Latest Blog

Proactive Maintenance is the Way to Go

July 14, 2025 8:30 am | By Compudata

How often do you think about the amount of downtime your business suffers and how much it’s costing you in lost profits and productivity? Estimates show that SMBs lose somewhere between $427 and $8,000 PER HOUR of downtime. Instead of dealing with downtime, we recommend an approach called proactive maintenance. Read More

Contact Us

Learn more about what Compudata can do for your business.

1-855-405-8889

Compudata
4-85 Midpark Rd
London, Ontario N6N 1B2

twitter RSS feed

About Compudata

Compudata strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges, starting with planning, implementing, and supporting the IT solutions that are critical to your growth and success.
About Us

Navigation

  • Catalog
  • Sitemap
  • Understanding IT
  • Privacy Policy
  • Accessibility Policy
Remote Support Tool

Trust

Consumer Choice Award Winner
© Compudata Systems London Inc — "Defining What IT Can Be Since 1995."

S5 Box – Login

Publish a login form or anything you want to this position.

S5 Box – Register

Publish a registration form or anything you want to this position.