• Skip to main navigation
  • Skip to main content
  • Skip to footer
JIG Technologies

JIG Technologies

Better. Happier. Peace of mind.

  • Managed IT Services
    • IT Support Services
      • Cloud Services
      • Office 365 Services
      • Computer Support and Repair
      • VMWare and Virtualization Services
      • Server Management
      • Network Architecture Solutions
      • Network and Server Support
      • Storage Solutions and Management
      • Enterprise Network Monitoring
    • Security
      • Software Security Services
      • Information Security Audit
      • IT Risk Assessment
      • Security Log Management
    • IT Consulting
      • IT Asset Management
      • Business Impact Analysis
      • IT Advisory Services
    • Device Management Service
      • Mobile Device Recovery
      • Mobile Cloud Computing Services
      • Desktop Management Software
    • Disaster Recovery
      • Hard Drive and Data Recovery
      • Data Security
      • Data Migration Services
    • Cloud Phone Systems
      • Hosted PBX Solutions
      • Virtual PBX Solutions
  • Software Development
    • Software Architecture and Design
    • Software Assessments and Management
    • PHP Development
    • Software Asset Management
    • Software IT Procurement
    • AODA / WCAG Compliance
  • Nonprofits and Charities
    • Healthcare
    • Warehouse and Logistics
    • Industries
  • Blog
    • Choosing a Software Developer
    • Software Development Costs
  • Contact Us
    • About Us
    • What Our Clients Say
    • Careers
  • Skip to menu toggle button

Header Submit a ticket

SUBMIT A TICKET  |  +1 866-615-2786

Category: Security

Laravel Security Best Practices

Posted on: 7 November 2022 Last updated on: 7 November 2022 Written by: Kostya Shakov
LARAVEL SECURITY BEST PRACTICES Laravel is a popular PHP development platform that is well known for its clean design and the active user community. Laravel is fairly secure by default because whenever a loophole is discovered, the maintenance team addresses…
Continue reading “Laravel Security Best Practices”…

IT Planning and Assessments for Your Nonprofit

Posted on: 14 February 2022 Last updated on: 14 February 2022 Written by: Kelly Noussis
How IT Planning and Assessments can help your organization meet its mission goals and bring you peace of mind
Continue reading “IT Planning and Assessments for Your Nonprofit”…

Cloud Services and Security

Posted on: 12 January 2022 Last updated on: 12 January 2022 Written by: Kelly Noussis
Cloud Computing and Security What is your responsibility as a customer and what is the responsibility of your provider Cloud computing is the delivery of computer services via the internet. This is an oversimplification, but hopefully it will be made…
Continue reading “Cloud Services and Security”…

What is Malware and How Does it Work?

Posted on: 17 November 2021 Last updated on: 17 November 2021 Written by: Kelly Noussis
In this article we look at 9 different types of malware and how they work.
Continue reading “What is Malware and How Does it Work?”…

What is Ransomware and How does it Work?

Posted on: 1 November 2021 Last updated on: 1 November 2021 Written by: Kelly Noussis
Ransomware is a form of malware (malicious software) that threatens to publish, block or delete a victim/s computer files, databases or applications.
Continue reading “What is Ransomware and How does it Work?”…
Illustration of a closed combination lock

6 Phases of a Ransomware Attack

Posted on: 29 October 2021 Last updated on: 29 October 2021 Written by: Kelly Noussis
Additional Writing Credit: Evan McLean – Microsoft Certified Security Administrator for JIG Technologies 6 Phases of a Ransomware Attack Phase 1: Exploitation and Infection The first step is to infect a victim’s computer with malware. This can be achieved by…
Continue reading “6 Phases of a Ransomware Attack”…

How to Protect Yourself from Phishing

Posted on: 20 October 2021 Last updated on: 21 October 2021 Written by: Kelly Noussis
Learn how to identify and protect yourself from phishing.
Continue reading “How to Protect Yourself from Phishing”…

Managed Service Providers vs. In-House IT

Posted on: 25 August 2021 Last updated on: 26 August 2021 Written by: Kelly Noussis
Managed Service Provider VS In-House IT Managed Service Providers (MSPs) will typically cost less annually than a full-time salary for a small to mid sized business. Most Managed Service Providers offer several flexible payment options to suit your business needs.…
Continue reading “Managed Service Providers vs. In-House IT”…

The Hidden IT Security Threats Right in Your Office Today

Posted on: 11 February 2021 Last updated on: 28 April 2021 Written by: Zach Bedard
There are a lot of reports in the news about IT security threats and the damage they have caused.  This has put a larger focus on implementing firewalls and anti-virus systems to prevent hackers from afar getting into our systems.…
Continue reading “The Hidden IT Security Threats Right in Your Office Today”…

Why Antivirus Doesn’t Work and What to do About it

Posted on: 11 February 2021 Last updated on: 8 June 2021 Written by: Zach Bedard
In a previous article, I talked about how cyber crime is continuing to get more sophisticated, and how the offenders are getting away with larger amounts. In this article, we’ll look at AntiVirus software why it’s not always effective and…
Continue reading “Why Antivirus Doesn’t Work and What to do About it”…
1 2 Next page »
JIG Technologies > Latest Articles > Security

Why wait? We are ready to impress you even more!

Get in touch now

Theme Links

  • Managed IT Services
  • Custom Software Development
  • Cyber Security
  • Education
  • Industries
  • Need Help? Contact Us

Submit A Ticket

Submit A Ticket


Resources

Contact Us

JIG Technologies
Head Office

Toronto Address
250 Merton Street Suite 301, Toronto, ON M4S 1B1
Toll Free: 1-866-615-2786
Toronto Local: 416-850-2684
Fax: 1-416-222-9131
Other Global Locations
Vancouver Address
1583 Marine Dr. Suite 33056 West Vancouver, BC V7V 1H0

© 2023 JIG Technologies | Using Icelander WordPress theme. | Privacy Policy | Back to top ↑