IT Horizons Blog

IT Horizons is not just your IT go-to team, we are your business partners!

IT Horizons Blog

We are IT Horizons - an IT company that strives to provide the ultimate solution for all your technology needs. We are blogging to help educate businesses in our community and keep them informed of current trends and opportunities.
Angie Saltman

How to Pass Your IT Insurance Audit with Flying Colours

how_to_pass_your_IT_insurance_audit_with_flying_colours
How to Pass Your IT Insurance Audit with Flying Colours Preparing for an IT Insurance Audit (Without the Stress) One of our clients recently had to go through an IT insurance audit before renewing their policy. They scored an impressive 93%, and the insurance company was happy to continue coverage. We were equally happy because it meant we were providing excellent managed IT services. (The 7% was from a concern in their system that was outside our work!) That experience got us thinking: IT insurance audits can feel a bit intimidating, but they’re actually a great opportunity. They show how well your current systems protect your organization and where you might need to tighten things up. Let’s break it down in a simple, no-stress way. What’s an IT Insurance Audit, Really? In short, the insurance company wants to make sure you’re doing your part to protect your systems. The better...
Continue reading
41 Hits
Angie Saltman

10 Reasons Why Incorporating Data Privacy is A Savvy Business Move

10-Reasons-Why-Incorporating-Data-Privacy-is-A-Savvy-Business-Move

Data privacy might sound like a dry topic, but actually, it's incredibly cool – and crucial – for Canadian businesses and organizations. Here’s why:

Continue reading
2788 Hits
Alex Saltman

Email Phishing - What Information You Should Never Give to Anyone

phishing
Have you ever received an email that does not look familiar or looks suspicious? Be wary of it, as it might be malware or any other form of cyber-attack, also commonly known as a phishing attack. If you ever come across any such email, that asks you to log in somewhere, the only logical thing to do is DO NOT LOGIN! The term ‘phishing’ comes from ‘fishing,’ only that in this case the victim is the “phish” and the hacker is the ‘phisherman’. It may (generally) ask you to allow access to an application or attachment sent in the email. And, if you follow the attacker’s instructions whether intentionally or unintentionally, you might get into serious trouble. The hacker can do anything, ranging from something less harmful like installing a simple virus in your system that handicaps certain applications, to attacking your computer with something as dangerous as ransomware. Ransomware...
Continue reading
10572 Hits