IT Horizons Blog

IT Horizons is not just your IT go-to team, we are your business partners!

IT Horizons Blog

We are IT Horizons - an IT company that strives to provide the ultimate solution for all your technology needs. We are blogging to help educate businesses in our community and keep them informed of current trends and opportunities.
Alex Saltman

Email Phishing - What Information You Should Never Give to Anyone

phishing
Have you ever received an email that does not look familiar or looks suspicious? Be wary of it, as it might be malware or any other form of cyber-attack, also commonly known as a phishing attack. If you ever come across any such email, that asks you to log in somewhere, the only logical thing to do is DO NOT LOGIN! The term ‘phishing’ comes from ‘fishing,’ only that in this case the victim is the “phish” and the hacker is the ‘phisherman’. It may (generally) ask you to allow access to an application or attachment sent in the email. And, if you follow the attacker’s instructions whether intentionally or unintentionally, you might get into serious trouble. The hacker can do anything, ranging from something less harmful like installing a simple virus in your system that handicaps certain applications, to attacking your computer with something as dangerous as ransomware. Ransomware...
Continue reading
9052 Hits
Guest

Be More Agile with IT Managed Services

Be More Agile with IT Managed Services
It can be difficult to accommodate even occasional changes for new hires, terminations, or staff changing jobs within your organization. If you’re like many other businesses in Grande Prairie and are dealing with seasonal highs and lows or high turnover, if your business has frequent staff changes it can be a nightmare on the IT side. When poorly managed, such moves, adds, and changes can be extremely painful, costly, and time-consuming to your business. You need to make sure your previous employee’s security access is neatly revoked on time. What should you do with their email? Who is taking over their responsibilities? Does your new hire have a computer assigned to them? Do they have the right printers? Are email list memberships and shared contacts in order? Do they have the documents and applications they need? Will it take a day, two, or even more before the IT changes are...
Continue reading
8319 Hits
Angie Saltman

Why You Want to Spend More on Business Class Hardware

Why You Want to Spend More on Business Class Hardware
When helping our Grande Prairie clients plan their hardware lifecycle I’m often asked about the price difference between consumer and business class devices. If you can go down the street to Costco or Best Buy and pick up the latest back-to-school-special laptop for $500, why on earth would you spend two or even three times that amount for a business-line laptop from Lenovo or Dell? Here are some important points to consider when purchasing computers to make sure you’re getting the best return on your investment. In the Windows PC market, inexpensive home lines come with whatever low-cost surplus components are available to the manufacturer on the factory floor at the time. Because of this, the specifications change month-to-month or even faster and there can be wide differences in the nuts and bolts even within a single model of PC or laptop. This means that not only are you often...
Continue reading
4223 Hits
Alex Saltman

Our IT Managed Services Could Have Saved $1000s from Ransomware

Our IT Managed Services Could Have Saved $1000s from Ransomware
You’ve probably heard of Cryptolocker. It’s the nefarious ransomware trojan targeting Microsoft Windows that made the rounds via email starting in 2013-2014 that locked businesses out of their own files by encrypting them and holding them hostage. It impacted many – including Grande Prairie organizations that you know and may do business with! Cryptolocker and its many ransomware cousins act like typical viruses in the way they’re spread and distributed. But what makes ransomware so dangerous to you and your business is the fact that it specifically targets corporate data for monetary gain and the results can be catastrophic for those whose network is unprepared and inadequately protected from such an attack. Ransomware works by encrypting and locking you out of the files on your computers, server, and network storage. These files could include your policies and procedures, sensitive contracts and agreements, or your accounting database and financials. The attackers...
Continue reading
3967 Hits
Alex Saltman

Choosing the Right Tech for Your Business

Choosing the Right Tech for Your Business
We all rely on tech to help run our business, and it’s great when it’s running smoothly, but it can be horrible and expensive when it isn’t. Hiring the right tech company to look after your technology will keep your systems functioning effortlessly, and can make the difference between just surviving and powering ahead in full growth mode! What to look for: A good IT firm will start by having a consultant sit down with your leadership team to listen and learn all about your business before recommending anything. They should provide unlimited computer support to you and your staff for a fixed monthly fee. A technology strategy plan will be offered and created for your business, with at least one year planned. Every business is different and has different technological needs. A custom tech solution is part of every successful business. Experience! Hire an IT company that has experience...
Continue reading
3576 Hits