Reis Blog

Visit the Reis Blog regularly for information an advice on information technology management in Canada, and around the world.

Survey Reveals the True Costs of VMWare Deployments, Demonstrates Interest in VMware Alternatives

What is a Security Operations Center (SOC)?

What Caffeine Drinks Do Countries Prefer?

How Your Small Business Can Respond to the Latest Cybersecurity Threats

Teacher builds mobile graduation stage for his students

What is Ethical Hacking (& How Can It Help My Business?)

Cyber Attacks Are On the Rise

Reis Informatica's Partners

Tech Gadgets for the Tech-Head Dads

Protecting Banking Activities

Uncovering the Differences Between MSP & MSSP

Keeping Kids Cyber-Safe | 6 Tips for Children's Internet Safety

Keep Your Websites Safe From Hackers

Microsoft's Windows 11 Announcement: Release Date and Features

What is a Man-in-the-Middle Attack?

VMware Alternative: TrustRadius Reviewers Recognize Scale Computing as HCI Leader

An Attack Every Eight Minutes: How to Avoid Being the Next Ransomware Victim

What is an MSP Anyway?

White House pushes for companies to take ransomware more seriously after high-profile cyberattacks!

The next generation of Windows will be revealed by Microsoft on June 24th!

COVID-19 and Cybersecurity

Why Your Business Needs Both a Disaster Recovery and a Continuity Plan

How Prepared is Your Organization to Work from Home?

Tips for Secure Remote Working During the Coronavirus Outbreak

Are You Set to Work From Home?

The Impact of the Coronavirus on Tech

What Does Modern Threat Landscape Mean?

Family Day Tips to Keep Your Family Safe and Fun Tech Things To Do

Some Tech Products We Love

10 Tips for Secure Computing

10 Important Cyber-Attacks from the Last Decade

Understanding Evil Twin Attacks

Tech Trends for Businesses in 2020

How to Stay Safe This New Year

Happy Holidays! Here Are Some Tips to Stay Safe During the Holidays

6 Cyber Security Tips for Online Holiday Shopping

A Problem Businesses Have: Illegal Software

The Development of IoT

The Best Backup Solution For Your Business Needs

How Factories Can Benefit From IT

IT Budgets and Controlling Costs

What to Know Before Choosing a Cloud Provider

How to Protect Your Small Business and How We Can Work Together

How to Protect Yourself Online

How Cyber Threats Affect You

How Cyber Threats Work

Windows, Mac, or Linux? What Should You Choose?

How the Media Industry Can Benefit From IT

Back-to-School Tech Security Tips

Back to School Tech for Anyone in 2019

Back to School: Five Steps Towards Securing Your School’s IT Network

How to Adapt to Emerging Tech and Infrastructure Changes

The Role of Infrastructure in IT

Android or Apple - What is the Most Secure Phone Out There?

5 Explosive Ways Fireworks Are Advancing and Their Timeline Through the Years

Do You Have Insufficient Managed IT Services?

How to Bring Tech Outside This Summer

How the Healthcare Industry Can Benefit from the IoT and IT

20 Tech Items to Bring on Your Summer Getaways

Did You Know These Tech Inventions Are Canadian?

The NSA is Advising Windows Users to Update Computers

Tech Books to Read This Summer of 2019

Network Devices Explained

Hardware and Software Issues: A Problem

Protecting Data with Cloud Services

Insufficient and Power Protection

How Carnival Cruise Ships Are Using IoT and AI to Create Smart Cities at Sea

How MSPs Can Grow Your Business

What is Fog Computing?

Tech Word Dictionary

A Common IT Problem: Using Too Much Paper

Top 10 Tips for Secure Computing

The New Role of IT

Is the Internet of Things Growing or Dead?

Raspberry Pi Private Telephone System (PBX)

Backup Issues and Disaster Recovery Challenges

Why Does My Business Need a Firewall?

The Role of IT Project Management

You Aren't The Only One Facing Network and Data Security Problems

Tech Trends for Businesses in 2019

Why the Smart Money is Moving to the Cloud?

The Benefits Accounting and Financial Firms Can Use From Moving to the Cloud

Phishing: Why Should Employees Be Taught To Be Skeptical?

Why You Should Care About Mobile Security

Post Holiday Safety Tips

Why You Need to Make Security Awareness Training Mandatory? Read This Horror Story.

No IT Plan? You’re Not the Only One Facing This Problem

Security for Small to Medium-Sized Businesses

The Role of Hybrid IT

How to Motivate Your Team And Create an Extraordinary Place to Work

What To Do About Website Downtime

6 Tips to Stay Safe from Viruses and Malware

The Role of Security Services in IT

Steps to Take After a Data Breach

9 Ways to Improve Your Company’s Cybersecurity

The Role of Managed Services

The Top 5 Technological Trends for Businesses in 2018

How the Construction Industry Can Benefit from the IoT

Keeping IT In-House vs. Outsourcing

10 Breakthrough Technologies in 2018

The Role of the Cloud: A Beginner’s Guide

What’s on Your Summer Reading List 2018?

Five Ways to Protect Your Business From Data Theft

Is Your Workplace Smart Enough?

The Smart Way to Protect Your Business From Wi-Fi Hackers.

Stay #CyberSafe during Internet Safety Month and All Year Round

Dealing with data: choosing the best solution for your business.

Are you aware of email spoofing? Download your cheat sheet and stay safe online.

IoT: what every business needs to know?

Recovering from a Worm or Virus Infection?

How the manufacturing world can benefit from the use of IoT technologies?

Why do you need a dedicated server for your business?

How to get your networking fundamentals right?

Videoconferencing: Cost and productivity benefits just a screen away

5 Reasons Why You Need Backup for Office 365

Is it time for upgrade?

Real workstations for virtual reality

Top 5 most important features in a business laptop.

How to design a backup strategy and protect your data?

6 Tips to Stay Safe and Secure Online

Where Should You Focus and Spend Your IT Budget?

The Goal of Technology in The Classroom

Really, what is the IoT?

How Should You Budget for IT?

5 Tips on How to Make Your Computer Run Faster

Big Clouds for Small Businesses

Onsite or offsite: Where should your data be?

5 Tips to Improve Your Data Security

Know your enemy: three new trends in cybercrime

Taking advantage of entry-level workstations

How Reis Information Systems chose its new way to collaborate.

Laptops or tablets in the classroom?

Four Ways to Enhance Your Endpoint Security

What is Linux?

The familiar USB is coming to an end

Save Your Time &  Money by Using Videoconferencing Software.

Need to upgrade your company's network?

Cisco Spark. A Cloud-Based Business Collaboration Service.

How technology is changing the way our children learn?

How to improve your relationship with your Managed Service Provider?

Samsung Launches New Cloud Tool

10 Reasons why Linux is Better Than  MacOS or Windows

10 Reasons PCs are Better than Macs

End-of-life software: What are the dangers?

If you use Wi-Fi on your iOS device, get this security update

Tech Summer Reading List of 2017 from Reis

Why Should You Use a Mac?

9 Technology Facts That Will Surprise You

11 Terms You Should Know When You're New to IT Management

7 Ways That Managed IT Services Save Money for Your Company

What is Infrastructure Services?

What is Managed Services Anyway?

WannaCry Security in a nutshell - What is it? How to defend yourself.

Why Having Good IT Policies Can be Your Best Friend

The Declining State of Data Backups

New MacOS Virus Can be Spying on You!

Fractional IT Services

Making Passwords Easy!

Security: The Problem

Moving to the Cloud?

Why Do Some Companies in Southwestern Ontario Still Not Have a Disaster Recovery Plan?