Reis Blog

Visit the Reis Blog regularly for information an advice on information technology management in Canada, and around the world.

Real Workstations For Virtual Reality

Why You Should Care About Mobile Security

5 Tips to Improve Your Data Security

How To Stay Cyber-Secure When Downloading & Using Apps

Are you aware of email spoofing?

How technology is changing the way our children learn

5 Tips on How to Make Your Computer Run Faster

It's Time to Celebrate Cybersecurity Month!

The Best Backup Solution For Your Business Needs

How to Keep Your Website Safe from Hackers

3 Risks to Your Business’ Wireless Security and How to Avoid Them

How to Protect Your Company From CEO Hacking Fraud

Why Manufacturers Must Protect Themselves Now

The Accounting Firm and Cybersecurity

Here’s How Managed Security Services Work

Microsoft announces Windows 11 will launch on Oct. 5th!

Why You Need an Incident Response Plan

How the Cybersecurity Market is Evolving

Cybersecurity is like an Onion

Why Hackers Do What They Do

Teams, Zoom, or Webex. Which One Is Right for Me?

Why a Security Focused MSP is Best

So You Want to Build Your Own Security Operations Center?

Why Law Firms Need to Prioritize Cybersecurity in 2021

Where Should You Focus and Spend Your IT Budget?

Risk of Data Leaks High as Employees Unsure About Confidentiality

IT Considerations for Working From Home for the Foreseeable Future

Break Bad IT Habits with Scale Computing

Have Your IT Infrastructure Ready For the Back-to-the-Office Rush This Fall

Do I Really Need To Change My Wireless Password All The Time?

How to Effectively Implement Two-factor Authentication

Reis Informatica Welcomes Emily to the Team!

Survey Reveals the True Costs of VMWare Deployments, Demonstrates Interest in VMware Alternatives

What is a Security Operations Center (SOC)?

What Caffeine Drinks Do Countries Prefer?

How Your Small Business Can Respond to the Latest Cybersecurity Threats

Teacher builds mobile graduation stage for his students

What is Ethical Hacking (& How Can It Help My Business?)

Cyber Attacks Are On the Rise

Reis Informatica's Partners

Tech Gadgets for the Tech-Head Dads

Protecting Banking Activities

Uncovering the Differences Between MSP & MSSP

Keeping Kids Cyber-Safe | 6 Tips for Children's Internet Safety

Keep Your Websites Safe From Hackers

Microsoft's Windows 11 Announcement: Release Date and Features

What is a Man-in-the-Middle Attack?

VMware Alternative: TrustRadius Reviewers Recognize Scale Computing as HCI Leader

An Attack Every Eight Minutes: How to Avoid Being the Next Ransomware Victim

What is an MSP Anyway?

White House pushes for companies to take ransomware more seriously after high-profile cyberattacks!

The next generation of Windows will be revealed by Microsoft on June 24th!

COVID-19 and Cybersecurity

Why Your Business Needs Both a Disaster Recovery and a Continuity Plan

How Prepared is Your Organization to Work from Home?

Tips for Secure Remote Working During the Coronavirus Outbreak

Are You Set to Work From Home?

The Impact of the Coronavirus on Tech

What Does Modern Threat Landscape Mean?

Family Day Tips to Keep Your Family Safe and Fun Tech Things To Do

Some Tech Products We Love

10 Tips for Secure Computing

10 Important Cyber-Attacks from the Last Decade

Understanding Evil Twin Attacks

Tech Trends for Businesses in 2020

How to Stay Safe This New Year

Happy Holidays! Here Are Some Tips to Stay Safe During the Holidays

6 Cybersecurity Tips for Online Holiday Shopping

A Problem Businesses Have: Illegal Software

The Development of IoT

How Factories Can Benefit From IT

IT Budgets and Controlling Costs

What to Know Before Choosing a Cloud Provider

How to Protect Your Small Business and How We Can Work Together

How to Protect Yourself Online

How Cyber Threats Affect You

How Cyber Threats Work

Windows, Mac, or Linux? What Should You Choose?

How the Media Industry Can Benefit From IT

Back-to-School Tech Security Tips

Back to School Tech for Anyone in 2019

How to Adapt to Emerging Tech and Infrastructure Changes

Back to School: Five Steps Towards Securing Your School’s IT Network

The Role of Infrastructure in IT

Android or Apple - What is the Most Secure Phone Out There?

5 Explosive Ways Fireworks Are Advancing and Their Timeline

Do You Have Insufficient Managed IT Services?

How to Bring Tech Outside This Summer

How the Healthcare Industry Can Benefit from the IoT and IT

20 Tech Items to Bring on Your Summer Getaways

Did You Know These Tech Inventions Are Canadian?

The NSA is Advising Windows Users to Update Computers

Tech Books to Read This Summer of 2019

Network Devices Explained

Hardware and Software Issues: A Problem

Protecting Data with Cloud Services

Insufficient and Power Protection

Carnival Cruise Ships Are Using IoT & AI to Create Smart Cities at Sea

How MSPs Can Grow Your Business

What is Fog Computing?

Tech Word Dictionary

A Common IT Problem: Using Too Much Paper

Top 10 Tips for Secure Computing

The New Role of IT

Is the Internet of Things Growing or Dead?

Raspberry Pi Private Telephone System (PBX)

Backup Issues and Disaster Recovery Challenges

Why Does My Business Need a Firewall?

The Role of IT Project Management

You Aren't The Only One Facing Network and Data Security Problems

Tech Trends for Businesses in 2019

The Benefits Accounting and Financial Firms Can Use From Moving to the Cloud

Phishing: Why Should Employees Be Taught To Be Skeptical?

Post Holiday Safety Tips

No IT Plan? You’re Not the Only One Facing This Problem

Security for Small to Medium-Sized Businesses

The Role of Hybrid IT

How to Motivate Your Team And Create an Extraordinary Place to Work

What To Do About Website Downtime

BOO! Don't newly developed Viruses and Malware Give You the Shivers?

The Role of Security Services in IT

Steps to Take After a Data Breach

9 Ways to Improve Your Company’s Cybersecurity

The Role of Managed Services

The Top 5 Technological Trends for Businesses in 2018

How the Construction Industry Can Benefit from the IoT

Keeping IT In-House vs. Outsourcing

10 Breakthrough Technologies in 2018

The Role of the Cloud: A Beginner’s Guide

What’s on Your Summer Reading List 2018?

Five Ways to Protect Your Business From Data Theft

Is Your Workplace Smart Enough?

The Smart Way to Protect Your Business From Wi-Fi Hackers.

Stay #CyberSafe during Internet Safety Month and All Year Round

IoT: what every business needs to know?

How the manufacturing world can benefit from IoT technologies

How to get your networking fundamentals right?

Videoconferencing: Cost and productivity benefits just a screen away

5 Reasons Why You Need Backup for Office 365

The Goal of Technology in The Classroom

Really, what is the IoT?

How Should You Budget for IT?

Onsite or offsite: Where should your data be?

Know your enemy: three new trends in cybercrime

Taking advantage of entry-level workstations

How Reis Information Systems chose its new way to collaborate.

Laptops or tablets in the classroom?

Four Ways to Enhance Your Endpoint Security

What is Linux?

The familiar USB is coming to an end

How to improve your relationship with your Managed Service Provider?

Samsung Launches New Cloud Tool

10 Reasons why Linux is Better Than  MacOS or Windows

10 Reasons PCs are Better than Macs

End-of-life software: What are the dangers?

If you use Wi-Fi on your iOS device, get this security update

Tech Summer Reading List of 2017 from Reis

Why Should You Use a Mac?

9 Technology Facts That Will Surprise You

7 Ways That Managed IT Services Save Money for Your Company

What is Infrastructure Services?

What is Managed Services Anyway?

WannaCry Security in a nutshell - What is it? How to defend yourself.

Why Having Good IT Policies Can be Your Best Friend

The Declining State of Data Backups

New MacOS Virus Can be Spying on You!

Fractional IT Services

Making Passwords Easy!

Security: The Problem

Moving to the Cloud?

Why Do Some Companies Still Not Have a Disaster Recovery Plan?

    
Reis Informatica Testimonials

Subscribe to Email Updates

Recent Posts

Posts by Topic

See all