• Skip to main content
Toronto
Vancouver
CLIENT PORTAL
Existing Customers:
(416)-850-2684
Sales Inquiries:
(855) 202-1706
site-logo1
  • Managed IT
    • IT Support Services
      • Cloud Services
      • Office 365 Services
      • Computer Support and Repair
      • Server Management
      • Network Architecture Solutions
      • Network and Server Support Services
    • Security
      • Software Security Services
      • Information Security Audit
      • Security Log Management
    • IT Consulting Services & Solutions
      • Business Impact Analysis
      • IT Advisory Services
    • Mobile Device Recovery
    • Mobile Cloud Computing Services
    • Disaster Recovery Services
      • Data Security Services by JIG Technologies
      • Data Migration Services
    • Cloud Phone Systems by JIG Technologies
      • Virtual PBX Solutions
  • Software Development Services
    • Software Architecture and Design
    • Software Assessments And Management 
    • PHP Development
    • Software Asset Management
    • Software IT Procurement
    • AODA / WCAG Compliance
    • Custom Software Development
  • Industries
    • Healthcare
    • Warehouse and Logistics
    • Not For Profit
  • Blog
    • Choosing a Software Developer
    • Software Development Costs
  • Contact Us
    • About Us
    • Our Team
    • What Our Clients Say
    • Careers
×
  • Managed IT
    • IT Support Services
      • Cloud Services
      • Office 365 Services
      • Computer Support and Repair
      • Server Management
      • Network Architecture Solutions
      • Network and Server Support Services
      • Enterprise Network Monitoring
    • Security
      • Software Security Services
      • Information Security Audit
      • Security Log Management
    • IT Consulting Services & Solutions
      • Business Impact Analysis
      • IT Advisory Services
    • Mobile Device Recovery
    • Mobile Cloud Computing Services
    • Disaster Recovery Services
      • Data Security Services by JIG Technologies
      • Data Migration Services
    • Cloud Phone Systems by JIG Technologies
      • Virtual PBX Solutions
  • Software Development Services
    • Software Architecture and Design
    • Software Assessments And Management 
    • PHP Development
    • Software Asset Management
    • Software IT Procurement
    • AODA / WCAG Compliance
    • Custom Software Development
  • Industries
    • Healthcare
    • Warehouse and Logistics
    • Not For Profit
  • Blog
    • Choosing a Software Developer
    • Software Development Costs
  • Contact Us
    • About Us
    • Our Team
    • What Our Clients Say
    • Careers

Latest Articles (page 6)

Cloud Services and Security

Posted on: 12 January 2022 Last updated on: 11 June 2024 Written by: Kelly Noussis
Cloud Computing and Security What is your responsibility as a customerand what is the responsibility of your provider Cloud computing is the delivery of computer services via the internet. This is an oversimplification, but hopefully it will be made clearer…
Continue reading “Cloud Services and Security”…

What is Malware and How Does it Work?

Posted on: 17 November 2021 Last updated on: 11 June 2024 Written by: Kelly Noussis
In this article we look at 9 different types of malware and how they work.
Continue reading “What is Malware and How Does it Work?”…

What is Ransomware and How does it Work?

Posted on: 1 November 2021 Last updated on: 1 November 2021 Written by: Kelly Noussis
Ransomware is a form of malware (malicious software) that threatens to publish, block or delete a victim/s computer files, databases or applications.
Continue reading “What is Ransomware and How does it Work?”…
Illustration of a closed combination lock

6 Phases of a Ransomware Attack

Posted on: 29 October 2021 Last updated on: 29 October 2021 Written by: Kelly Noussis
Additional Writing Credit: Evan McLean – Microsoft Certified Security Administrator for JIG Technologies 6 Phases of a Ransomware Attack Phase 1: Exploitation and Infection The first step is to infect a victim’s computer with malware. This can be achieved by…
Continue reading “6 Phases of a Ransomware Attack”…

How to Protect Yourself from Phishing

Posted on: 20 October 2021 Last updated on: 21 October 2021 Written by: Kelly Noussis
Learn how to identify and protect yourself from phishing.
Continue reading “How to Protect Yourself from Phishing”…
banner illustration of computers joined by flow chart lines

How do Consumer Laptops and Business Laptops Compare

Posted on: 15 September 2021 Last updated on: 22 September 2021 Written by: Kelly Noussis
How to pick the right laptop Business Laptops versus Consumer Laptops An IT Company review on what the best options are for you and your organization Performance | Technical Features | Appearance | Pricing | Serviceability It’s hard to know just…
Continue reading “How do Consumer Laptops and Business Laptops Compare”…

Managed Service Providers vs. In-House IT

Posted on: 25 August 2021 Last updated on: 26 August 2021 Written by: Kelly Noussis
Managed Service Provider VS In-House IT Managed Service Providers (MSPs) will typically cost less annually than a full-time salary for a small to mid sized business. Most Managed Service Providers offer several flexible payment options to suit your business needs.…
Continue reading “Managed Service Providers vs. In-House IT”…

Top 5 IT Mistakes Small Businesses Make

Posted on: 29 June 2021 Last updated on: 13 July 2021 Written by: jigadmin
Number Five 5 Not verifying backup, or having backup retention All business owners know that backup is important and often set it up.  However, many forget to test or run multi-layer backup retention. Here are some real-life examples that we’ve…
Continue reading “Top 5 IT Mistakes Small Businesses Make”…

Fear Machine Learning

Posted on: 11 February 2021 Last updated on: 11 June 2024 Written by: Zach Bedard
Advances in artificial intelligence (AI) have brought us to the point where systems are using a combination of algorithms, analysis, and experience to learn and program themselves without human intervention.   For instance: [bctt tweet=”38% of consumers believe that AI will…
Continue reading “Fear Machine Learning”…

The Hidden IT Security Threats Right in Your Office Today

Posted on: 11 February 2021 Last updated on: 28 April 2021 Written by: Zach Bedard
There are a lot of reports in the news about IT security threats and the damage they have caused.  This has put a larger focus on implementing firewalls and anti-virus systems to prevent hackers from afar getting into our systems.…
Continue reading “The Hidden IT Security Threats Right in Your Office Today”…
« Previous page 1 … 4 5 6 7 8 9 Next page »

Don't settle for less Get More From Your IT Partner

Call our business managed IT services department directly at (855) 202-1706 or simply fill out this form and we will get in touch with you to set up a getting-to-know-you introductory phone call.

What Happens Next?

form-download-icon
Fill in our quick form.
phone-icon
We'll schedule an introductory phone call.
steps-icon
We'll take the time to listen and plan the next steps.

"*" indicates required fields

pin 1
Toronto Office

250 Merton Street Suite 301, Toronto, ON M4S 1B1

pin 1
Vancouver Office

6270 Nelson Ave, West Vancouver, BC V7W 2A3

Mail: 1583 Marine Dr. Suite 33056 West Vancouver, BC V7V 1H0

telephone 2
Existing Customers

416-850-2684

telephone 2
Sales Inquiries

(855) 202-1706

mail
Email:

info@jig.to

Fax:

(416) 222-9131

© Copyright 2025 JIG Technologies. All Rights Reserved. | Privacy Policy