IT Horizons Blog

IT Horizons is not just your IT go-to team, we are your business partners!

IT Horizons Blog

We are IT Horizons - an IT company that strives to provide the ultimate solution for all your technology needs. We are blogging to help educate businesses in our community and keep them informed of current trends and opportunities.
Angie Saltman

Ultimate Guide to IT Project Management


Some teams sit around the break room talking about that one big project that might happen, or vacation plans… but if you want to see our team get super animated about a topic, it probably involves IT Project Management.

Because there’s nothing more exciting than starting a huge IT project that’ll require everyone’s favourite skills, right? Wrong? OK, well, let’s chat about what we love about IT project management and all the things you won’t have to worry about because we’ve got it covered.

Continue reading
1684 Hits
Alex Saltman

All About Hybrid IT Management


Do you remember the olden days, when an office would have a big monitor at each desk, under the desk everyone had their own chunky tower, a big noisy server sat in the back office, and a stream of cords connected everything together to make a ‘modern’ office? It’s almost crazy to try to imagine doing business that way now!

Of course, if you have an office (and you may not even need one of those anymore), you’ll still have some on-site equipment. But now you’ve also got cloud-based ‘equipment’—services that are accessed from anywhere and provide an essential link to co-workers, customers, projects, and data.

Continue reading
1027 Hits
Angie Saltman

Ransomware - What it is and Why a Business Always Needs Backup

With all the positive advancements in information technology, the growth of cyber crime has been a notable drawback. Cyber crime refers to committing theft or any other criminal act through the use of computers or any other tech gadget. In the past five years, Ransomware has been a major source of cyber crime activities. Ransomware is a malicious software that does not allow you to access your files if it takes over your computer. The creator of the software demands ransom (as the name suggests) from the victim, if they want to gain access to their files again. The payments are normally made in non-traceable transactions through a cryptocurrency (normally Bitcoin) to ensure the attacker’s safety. The victims get so confused and scared that they immediately agree to pay the amounts without considering if the hacker will grant them access or will not do it again. The hacker prevents you...
Continue reading
7653 Hits