IT Horizons Blog

IT Horizons is not just your IT go-to team, we are your business partners!

IT Horizons Blog

We are IT Horizons - an IT company that strives to provide the ultimate solution for all your technology needs. We are blogging to help educate businesses in our community and keep them informed of current trends and opportunities.
Alex Saltman has not set their biography yet
Alex Saltman

Get Relief with IT Managed Services 

tech_headaches

Once a business hits 5 or 6 computer stations, managing IT can become a demanding task. Your business relies on its IT infrastructure to function optimally. As technology continues to change, it’s time-consuming (and often costly) to keep up.

That’s why IT Managed Services has become an increasingly popular solution for businesses looking to outsource the management and maintenance of their IT systems.

Here are a few ways that IT Horizons relieves the burden of managing IT for our clients:

Continue reading
1992 Hits
Alex Saltman

All About Hybrid IT Management

blended_it-01

Do you remember the olden days, when an office would have a big monitor at each desk, under the desk everyone had their own chunky tower, a big noisy server sat in the back office, and a stream of cords connected everything together to make a ‘modern’ office? It’s almost crazy to try to imagine doing business that way now!

Of course, if you have an office (and you may not even need one of those anymore), you’ll still have some on-site equipment. But now you’ve also got cloud-based ‘equipment’—services that are accessed from anywhere and provide an essential link to co-workers, customers, projects, and data.

Continue reading
1459 Hits
Alex Saltman

What’s the Difference Between IT Services and IT Consulting?

june_blog_post_02

IT services and IT consulting are often used interchangeably. But there are some important differences between the two that will influence which your business needs—or if you need both.

If you want the short answer, it’s this: IT services does stuff, and IT consulting tells you what to do.

Regardless of which one your business needs, we all agree that IT (Information Technology) as an essential component of nearly every business. IT includes everything from computers to software, the internet, technical support, security, data protection (backups), and internal and external networks. If you’re reading this, you are accessing information courtesy of IT.

Continue reading
1286 Hits
Alex Saltman

Email Phishing - What Information You Should Never Give to Anyone

phishing
Have you ever received an email that does not look familiar or looks suspicious? Be wary of it, as it might be malware or any other form of cyber-attack, also commonly known as a phishing attack. If you ever come across any such email, that asks you to log in somewhere, the only logical thing to do is DO NOT LOGIN! The term ‘phishing’ comes from ‘fishing,’ only that in this case the victim is the “phish” and the hacker is the ‘phisherman’. It may (generally) ask you to allow access to an application or attachment sent in the email. And, if you follow the attacker’s instructions whether intentionally or unintentionally, you might get into serious trouble. The hacker can do anything, ranging from something less harmful like installing a simple virus in your system that handicaps certain applications, to attacking your computer with something as dangerous as ransomware. Ransomware...
Continue reading
9958 Hits
Alex Saltman

Our IT Managed Services Could Have Saved $1000s from Ransomware

Our IT Managed Services Could Have Saved $1000s from Ransomware
You’ve probably heard of Cryptolocker. It’s the nefarious ransomware trojan targeting Microsoft Windows that made the rounds via email starting in 2013-2014 that locked businesses out of their own files by encrypting them and holding them hostage. It impacted many – including Grande Prairie organizations that you know and may do business with! Cryptolocker and its many ransomware cousins act like typical viruses in the way they’re spread and distributed. But what makes ransomware so dangerous to you and your business is the fact that it specifically targets corporate data for monetary gain and the results can be catastrophic for those whose network is unprepared and inadequately protected from such an attack. Ransomware works by encrypting and locking you out of the files on your computers, server, and network storage. These files could include your policies and procedures, sensitive contracts and agreements, or your accounting database and financials. The attackers...
Continue reading
4860 Hits