• About

  • Business Services

    • Business Services
    • Managed IT Services
    • integriTRUST
    • Cylance
    • Business Continuity - Backup & Disaster
  • Residential Services

    • Residential
  • Blog

  • Testimonials

  • Contact Us

  • more...

    • Malwarebytes
  • More

    Use tab to navigate through the menu items.

    info@intechcs.ca

    306-912-1463

    • INTECH on Facebook
    • INTECH on YouTube
    • INTECH on LinkedIn
    Get a Quote

    Your IT Team!

    Intelligent. Integrity. In time.

    0
    Large Logo & Glyph Blues 945x269.png

    Recent Posts

    Call to Action #29 - Settlement Agreements with Survivors

    Call to Action #29 - Settlement Agreements with Survivors

    Call to Action #28 - A Call to Law Schools in Canada

    Call to Action #28 - A Call to Law Schools in Canada

    Call to Action #27 - Federation of Law Societies, Cultural Competency Training

    Call to Action #27 - Federation of Law Societies, Cultural Competency Training

    Archive

    • October 2021
    • September 2021
    • February 2020
    • August 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017

    Tags

    No tags yet.
    INTECH <3 Cylance - Defeating Malicious USB Attacks

    INTECH <3 Cylance - Defeating Malicious USB Attacks

    The balance between rock-solid antivirus protection and tiny, user-friendly footprint has a new best friend. Watch Cylance PROTECT beat a malicious USB attack! Check out the whole playlist here. Contact INTECH today to get your Organization/Family covered by the wonders of Cylance PROTECT. Learn more: https://www.INTECHcs.ca/cylance for more details. Have you protected your assets? Contact INTECH today if you have any questions, or require any assistance shoring up your compu
    Gone Phishing

    Gone Phishing

    Threat Alert! #Phishing is real. This morning my inbox had a little gem ready and waiting, hoping to wreak havoc on me and my contacts! In this age of digital everything, it is not uncommon to receive legal documents in your inbox. #DocuSign is a common platform for such things. Now when these arrive from folks in your contact list, and especially from potential clients, or at least folks you've done work for, then it doesn't take much to hit that left mouse button. My finger
    Buried on page 5 - Ten bad guys we've seen before.

    Buried on page 5 - Ten bad guys we've seen before.

    Not every malware threat makes the  5 o'clock news headlines or basks in the glory of front-page exposure. In fact, most threats don&#39
    The Finish Line

    The Finish Line

    Educate your people: Employees are the weakest link when it comes to cybersecurity. Invest in education and coaching.  Make internet safety
    Frustrating the Wolf - Lessons Learned from the 3rd Little Pig

    Frustrating the Wolf - Lessons Learned from the 3rd Little Pig

    Remember those 3 little, industrious pigs? Well, they’re us. All of us business owners, organisations, and humans using computers. The big bad wolf— there are millions of them, they are the bad actors that are trying to steal your data in its myriad forms. This post looks at five of the bricks used by the smartest little piggy—the one who saved his brethren from the wolf in a well-built stronghold. If only I had a nickel for every time a business owner/manager misunderstood w
    3 Ways to Tie Your Camel

    3 Ways to Tie Your Camel

    In keeping with our commitment to promote cyber-security awareness and to keep the topic from slipping to the dark and forgotten recesses of
    Penetration Testing...
What is it, and why?

    Penetration Testing... What is it, and why?

    A penetration test often referred to as a pen-test, is an attempt to evaluate the security of an IT infrastructure by safely exploiting its potential vulnerabilities. These vulnerabilities may exist in services and program or code flaws, operating systems, improper configurations or as the result of risky end-user behaviours. These assessments are also useful in validating the effectiveness of an organization’s defensive mechanisms, as well as, end-user adherence to security
    6 Tips to Strengthen your Defences Against Cyberattacks in 2018

    6 Tips to Strengthen your Defences Against Cyberattacks in 2018

    CYBERATTACKS ARE ON THE RISE! Experts and analysts agree: 50% of businesses will likely be the victims of cyberattacks in 2018. The headlines will continue to be captured by high-profile data breaches affecting enterprise organizations. Nevertheless, it is the small and medium-sized businesses that will suffer most. Firstly, up to 70% of cyberattacks target SMBs and, lacking enterprise-size resources, and pockets deep enough to mitigate losses incurred from comprised data, a
    • INTECH on Facebook
    • INTECH on Twitter
    • INTECH on YouTube
    • INTECH on Instagram
    • INTECH on Google+

    info@intechcs.ca

    306-912-1463

    Privacy

    509A Lisgar Ave
    Saskatoon, S7L 5G7
    Canada

    MSPAlliane Log

    2022 INTECH Computer Solutions Inc.