Technical Action Group

Blog

Android or iPhone for business

The smartphone has become the lynchpin of the modern workplace. Once used only for calls, text messages and emails, today, smartphones are extensions of the business. If your employees are going to be truly agile, you need to equip them ...

These companies used pirated software and lost millions of dollars

Canada once lagged behind global efforts to reduce software piracy. The CBC reported that the piracy rate for commercial software in Canada was 39% in 2003. Compare that to 23% in the United States, one of the lowest in the ...

Fake CEO and 4 other types of email scams (phishing)

We all laughed heartily when James Veitch told his story (scroll below for video) of working with a spammer to ‘sell gold’. But most phishing scams don’t have such happy endings. Real people and businesses have lost millions of dollars ...

Small Business Cyber Security Trends for 2020

Have you ever visited a website only to see a scary red warning sign saying hackers might be trying to steal your information? You’re not alone and, like others, you probably shut down that webpage faster than you can say ...

Business vs. Consumer Laptops: Worth Paying the Extra Amount?

If you’re looking to buy a laptop that works well for personal and business use, know that you’re in the majority. This is a common trend among consumers because, nowadays, there is no real distinction between a home and an ...

Disaster Recovery Plan Steps: How to Protect Your Network before an Attack Occurs

Businesses today rely on a plethora of IT infrastructure. From emails to critical client data, all are reliant on a vast network of interconnected devices. Unfortunately, the convenience of cloud computing and web applications makes business owners complacent about planning ...

A Timeline of Facebook Security Scandals: Lessons We Can Learn

At the time of writing of this article, Facebook is on the verge of launching its own currency, Libra - no doubt, with some (ironic) allusion to ‘liberation’. There are many questions around this global transaction platform – being championed ...

Shopping For Disaster Recovery Solution Providers? 7 Factors To Consider

Data protection is key to disaster recovery solutions. And, yet, Forbes reports 90% of small businesses don’t have data backup in place. It is truly an astonishing statistic. With trade secrets, intellectual property and entire businesses hinged on computers and ...

Critical Measures To Take In A Ransomware Cyber Attack

The ransomware cyber attack has grown as a cyber-threat exponentially in the past few years. Ever since the WannaCry attack in 2017, news media has reported large scale ransomware attacks regularly. And no individual or organization is safe from ransomware. ...

Do Your Systems Have Malware? 6 Malware Protection Best Practices

Malware is one of the single biggest risks businesses face today. Why? It’s because confidential client and financial information, customer databases, business strategies and intellectual property are stored electronically. In fact, in such a digital world, many businesses rely solely ...

Contact

Technical Action Group
56 The Esplanade Suite 212
Toronto, Ontario M5E 1A7

Phone: (416) 489-6312
Email: Info@TechnicalActionGroup.com

Social Media