Hit enter to search or ESC to close
Technical Action Group
  • Home
  • Is This You?
  • IT Support Services
    • Managed IT services
      • Computer Support – PC & Mac in Toronto
      • Remote and On-Site Computer Support in Toronto
      • Network Installations & Upgrades
      • Chief Information Officer (CIO)
      • Preventative Maintenance
      • 24×7 Network Monitoring
      • Remote Network Access in Toronto
      • E-Mail Spam Filtering in Toronto
    • Backup and Disaster Recovery
      • Cloud Applications Backups & Disaster Recovery
      • Off-Site / Remote Backups With Disaster Recovery
      • Recovery Time Calculator
      • Hard Drive Backup System
    • Network Security
      • Cybersecurity Education – Free to All Clients
      • Dark Web Monitoring
      • Security Awareness Training
      • Web Access Protection
      • PCI Compliance
      • Remote Working – Endpoint Security
    • –
      • Cloud Computing
        • Business Applications in the Cloud
        • Document Management in the Cloud
        • Virtual Hardware
        • Office 365 and Google Workspace
      • Other Services
        • Phone Systems (VoIP & Cloud)
        • MAC & PC Support
        • IT Outsourcing
        • IT Support
  • Free Stuff
    • Business Advisory Guides
    • Hassle Free IT book
    • Free Network Audit
  • Blog
  • Our Clients
  • About Us
    • Our Story
    • Who We Are
    • Why Choose Us?
    • IT Service Areas in the Greater Toronto Area
    • Referral Program for Managed IT Services
    • IT Careers in the Toronto Area
  • Contact
  • 416-489-6312
Category

Security

CyberCrime PreventionEmployee ProductivityPhishingSecuritySpam

Fake CEO and 4 other types of email scams (phishing)

admin
adminNovember 15, 2019
We all laughed heartily when James Veitch told his story (scroll below for video) of…
LaptopsManaged ServicesSecuritySoftware

Business vs. Consumer Laptops: Worth Paying the Extra Amount?

admin
adminSeptember 15, 2019
If you’re looking to buy a laptop that works well for personal and business use,…
Backup and Disaster RecoveryCloud ComputingRansomwareSecurity

Disaster Recovery Plan Steps: How to Protect Your Network before an Attack Occurs

admin
adminJuly 13, 2019
Businesses today rely on a plethora of IT infrastructure. From emails to critical client data,…
Employee ProductivityHandheld Devices / SmartphonesSecurity

A Timeline of Facebook Security Scandals: Lessons We Can Learn

admin
adminJune 14, 2019
At the time of writing of this article, Facebook is on the verge of launching…
BlogSecurity

9 Steps to Bulletproof Security for Your Network

admin
adminMarch 28, 2019
Have you experienced network security problems that have cost your small to midsize business valuable…
BlogSecuritySpywareViruses

Do Your Systems Have Malware? 6 Malware Protection Best Practices

admin
adminMarch 17, 2019
Malware is one of the single biggest risks businesses face today. Why? It’s because the…
BlogE-MailRansomwareSecurity

Security Alert: Rapid increase in Ransomware and Ransom Email Demands

admin
adminOctober 16, 2018
We’ve seen a rapid increase in e-mail ransom demands and ransom threats in businesses in past…
Backup and Disaster RecoverySecurity

Common Technology Problems Facing Small Businesses and How to Solve Them

admin
adminSeptember 19, 2018
Businesses today are more dependent on their technology than at any time in history. New…
SecurityTAG Blog

Best Practices to Keep Company Data Safe

admin
adminSeptember 5, 2018
As business owners, we see the headlines every day. Data breaches aren’t going away and…
CyberCrime PreventionDesktop ComputersSecurity

Your Most Loyal Employees Could Be Your Company’s Biggest Security Risk

admin
adminMay 16, 2018
If your business is like most today, you rely heavily on technology to accomplish your…
Previous 1 2 3 Next

Search

Technical Action Group | Footer logo

IMPORTANT LINKS

  • Home
  • Blog
  • Our Clients
  • About Us
  • Contact
  • Support Center (for existing clients)

SERVICES

  • Managed IT Services
  • Cloud Computing
  • Network Security
  • Backup & Disaster Recovery
  • MAC Support
  • Phone Systems
  • Network Installations & Upgrades
  • Custom Projects
  • CIO

CONTACT US

Technical Action Group
56 The Esplanade
Toronto, Ontario M5E 1A7

Phone: (416) 489-6312
Email: info@TechnicalactionGroup.com

© Copyright 2022 Technical Action Group

  • Home
  • Is This You?
  • IT Support Services
    • Managed IT services
      • Computer Support – PC & Mac in Toronto
      • Remote and On-Site Computer Support in Toronto
      • Network Installations & Upgrades
      • Chief Information Officer (CIO)
      • Preventative Maintenance
      • 24×7 Network Monitoring
      • Remote Network Access in Toronto
      • E-Mail Spam Filtering in Toronto
    • Backup and Disaster Recovery
      • Cloud Applications Backups & Disaster Recovery
      • Off-Site / Remote Backups With Disaster Recovery
      • Recovery Time Calculator
      • Hard Drive Backup System
    • Network Security
      • Cybersecurity Education – Free to All Clients
      • Dark Web Monitoring
      • Security Awareness Training
      • Web Access Protection
      • PCI Compliance
      • Remote Working – Endpoint Security
    • –
      • Cloud Computing
        • Business Applications in the Cloud
        • Document Management in the Cloud
        • Virtual Hardware
        • Office 365 and Google Workspace
      • Other Services
        • Phone Systems (VoIP & Cloud)
        • MAC & PC Support
        • IT Outsourcing
        • IT Support
  • Free Stuff
    • Business Advisory Guides
    • Hassle Free IT book
    • Free Network Audit
  • Blog
  • Our Clients
  • About Us
    • Our Story
    • Who We Are
    • Why Choose Us?
    • IT Service Areas in the Greater Toronto Area
    • Referral Program for Managed IT Services
    • IT Careers in the Toronto Area
  • Contact
  • 416-489-6312