Quercus IT Blog

Quercus IT has been serving the Edmonton area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Take Data Breach Seriously Before It’s Too Late

Take Data Breach Seriously Before It’s Too Late

Whenever you see a data breach in the news, it’s never a good thing. Their impact ranges from minor to severe, and depending on the size and scope of the breach, it could even be bad enough to break a business. Let’s go over how you can keep your business from suffering from data leaks.

Continue reading

So, Your Network was Breached… What Do You Do Next?

So, Your Network was Breached… What Do You Do Next?

Businesses currently face an unprecedented level of threat from data breaches, with more means of undermining their security out there than ever before. Making the situation worse, all it takes is one to bring significant impacts to your business, from financial and reputational loss, not to mention all the potential legal issues that come into play. Let’s review what you need to do should you ever be on the receiving end of a breach.

Continue reading

Tip of the Week: Understanding Your Smartphone Battery’s Lifespan

Tip of the Week: Understanding Your Smartphone Battery’s Lifespan

When your smartphone battery dies, you’re left feeling inconvenienced and, likely, pretty annoyed. Unless you’re carrying your charger on you at all times, you’ll need to find a solution to your battery charge issues. The solution, like with many other technological issues, is to be proactive and take action to keep your battery from dying in the first place. That’s what we’re here to discuss today.

Continue reading

Centralized Data Storage is the Better Option. What’s Your Excuse?

Centralized Data Storage is the Better Option. What’s Your Excuse?

Are you sure that your business can control all of its data? Are you absolutely certain that it can be accessed when needed? Can you guarantee that it’s as secure as humanly possible, wherever it happens to be? You should be able to answer these questions with an unequivocal and resounding “yes,” yet central data management is far from a simple task.

Continue reading

Be Proactive with Your Technology to Prevent Problems Altogether

Be Proactive with Your Technology to Prevent Problems Altogether

If your business could go about its daily tasks without having to worry about technology, you would find yourself suddenly much more productive and efficient. Think of all the time and money you could save by not reacting to technology problems. With the right tools and approaches, your company can make great strides toward a more proactive technology management model.

Continue reading

Cybersecurity Burnout Is Real: Here’s How to Prevent It

Cybersecurity Burnout Is Real: Here’s How to Prevent It

Cybersecurity is complicated, with countless moving parts that all contribute to a well-protected network. This includes password changes, multi-factor authentication, and policies and procedures that could make the average workday a headache for the average office worker. Cybersecurity burnout is a real thing, and it’s becoming a major problem for businesses that don’t approach it intentionally.

Continue reading

What Can Businesses Learn from Schofield’s Laws of Computing?

What Can Businesses Learn from Schofield’s Laws of Computing?

We frequently write about topics in relation to business IT, but one that we have yet to cover is Schofield’s Laws of Computing. What are these laws, and what can businesses learn about them?

Continue reading

4 Security Topics to Keep In Mind During the Onboarding Process for New Hires

4 Security Topics to Keep In Mind During the Onboarding Process for New Hires

All companies have policies in place which govern how their employees use their technology, so it makes sense that any new employees should be onboarded in accordance with these expectations. Let’s go over how you can make sure your new employees know and understand your organization’s policies as they relate to business technology.

Continue reading

Don’t Fall Behind on Your Cybersecurity

Don’t Fall Behind on Your Cybersecurity

Any business that uses information technology needs to be considerate of its security. It’s also important for these businesses to remember that this security is always being innovated upon to better protect their organizations and their users.

Let’s consider why this constant innovation needs to be something that your organization emulates where its cybersecurity policies and processes are concerned.

Continue reading

Tip of the Week: Protect Your Business with Strong Passwords

Tip of the Week: Protect Your Business with Strong Passwords

The prevalence of technology in even mundane, everyday tasks means that more scams are out there to take advantage of unsuspecting victims. Hackers will do everything they can to take advantage of vulnerabilities in your systems, as well as cracks in your employees’ technological know-how. One way you can take the fight to them is by reinforcing appropriate password security measures.

Continue reading

You’ve Been the Victim of a Cyberattack: What Do You Do Now?

You’ve Been the Victim of a Cyberattack: What Do You Do Now?

If you find yourself in a position where your business has been hacked, it can be devastating for productivity and efficiency, not to mention the security of your company’s assets—personnel or otherwise. It’s quite easy for even seasoned professionals to expose themselves to these attacks, so how should you respond if you’re the one who has been hacked? That’s what we’re going to discuss today.

Continue reading

What You Should Do if You Think You’ve Lost Your Phone

What You Should Do if You Think You’ve Lost Your Phone

Even the most dedicated smartphone user will lose it from time to time, which is particularly inconvenient if you are away from the safety of your home or office. To help address this issue, we’ve put together some ideas for what you should do if you ever do lose your device.

Continue reading

Tip of the Week: Five Simple Steps Towards a More Productive Business

Tip of the Week: Five Simple Steps Towards a More Productive Business

If asked, most business owners would likely rank “improving productivity” as one of their overall business goals—and for obvious reasons. Often less obvious, however, is how to go about accomplishing this particular goal. Here, we’ve put together five different but equally effective ways to do so.

Continue reading

How to recover quickly from an IT disaster

How to recover quickly from an IT disaster

Any slowdown, interruption or complete failure of a critical system or network could result in an IT disaster for your organization. These can be triggered internally by employee errors, cyberattacks, or data breaches, as well as natural disasters like floods or fires that can cause equipment failure and power outages. 

Continue reading

How Data Gets Stolen (Even When Security Measures are in Place)

How Data Gets Stolen (Even When Security Measures are in Place)

We talk a lot about best practices that you and your entire workforce need to follow in order to protect yourself, your business, and your customers from data theft. From ensuring that you have strong, unique passwords and making sure two-factor or multi-factor authentication is applied to all of your accounts, to keeping your endpoints updated, a lot of prevention is considered the barest necessities of cybersecurity. It’s worth understanding just how clever cybercriminals are, and just how easy it is to slip up and lose control over your own information.

Continue reading

Who is Handling These Critical IT Tasks In Your Organization?

Who is Handling These Critical IT Tasks In Your Organization?

Your business might have a full-time IT person, but it also might not have one, and in cases like this, you might find yourself waiting to call your go-to person until you are experiencing a full-blown problem. The reality is that your internal, non-IT staff should not be responsible for the job of your IT department, and if you are relying on someone externally to handle your technology help, then you’ll want to make sure they tick all of the following boxes.

Continue reading

How to Properly Test Your Data Migration Processes

How to Properly Test Your Data Migration Processes

Regardless of the business attempting it, data migration (or the process of moving data and systems to a new piece of infrastructure) is critical to get right. One way to improve your chances of success is to create and follow a migration strategy, evaluating it as you go. Let’s walk through some practices involved in doing so.

Continue reading

Tip of the Week: 3 Steps You Can Take to Keep Your Computer Clean

Tip of the Week: 3 Steps You Can Take to Keep Your Computer Clean

Any machine needs regular maintenance which includes periodic cleaning. This includes any computer you use. We have put together three actions you can take to ensure that your machines aren’t going to break down from a lack of physical maintenance. 

Continue reading

The Basics of a Secure Network

The Basics of a Secure Network

Unfortunately, some businesses have had to learn the hard way in order to pay attention to their business’ cybersecurity efforts. These cautionary tales aren’t lost on many business owners, but in some cases, they are still ignored. That’s where we come in. Today, we thought we would go through some basic things that any organization needs to know to keep their business safe. 

Continue reading

How to Avoid Becoming the Next Data Security Cautionary Tale

security_cautionary_tale

Data security isn’t a matter to be taken lightly, as too many businesses have found out the hard way. Unfortunately, there are far too many simple ways to correct common security issues - enough that it’s foolish not to do so. We’ll review a few ways to fix security issues, after discussing one of, if not the, most egregious security failings in modern history.

Continue reading
Request a Consultation

Quercus IT strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
Contact Us

Learn more about what Quercus IT can do for your business.

2-15015 123 Ave NW,
Edmonton, Alberta T5V 1J7

Call us: (780) 409-8180

News & Updates
Wow, it has been busy these last couple of months! We've gone through many iterations of our public Website over the last 17 years, with this one having the most content. Our hope is that you can find the information you're looking for, so you can ma...
Web Analytics