Quercus IT Blog

Quercus IT has been serving the Edmonton area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Reasons Ransomware is So Scary

3 Reasons Ransomware is So Scary

Perhaps the most dangerous and notorious modern malware, ransomware affects businesses and industries without any regard to size or scope. It can even impact individual users and get away with it. We urge businesses to consider the other dangers associated with ransomware beyond just paying the ransom, as they extend far beyond and could have lasting impacts on your operations.

Continue reading

What You Can Do to Improve Your Wireless Security

What You Can Do to Improve Your Wireless Security

Keeping your business’ Internet connections secure is paramount in the quest to maintain cybersecurity. There really isn’t any other option. Fortunately, protecting your business’ wireless connections isn’t that difficult. This month, we will go through a few steps that you can take to help keep your Wi-Fi connection secure. 

Continue reading

The Fundamentals of Security are Always Important

The Fundamentals of Security are Always Important

Fundamentals are always important. This is true regardless of what you seek to accomplish. In regards to business technology, having a fundamental understanding of the technology and strategies you use to get things done, can help you concoct a plan that will be effective in keeping that technology secure. Let’s look at what today’s cyberattack entails and what an organization needs to do in order to keep the threats from having an effect on their business. 

Continue reading

Four Things to Remember When Implementing New Technology

Four Things to Remember When Implementing New Technology

Your aim should always be to build more efficiency into your business. It boosts the productivity of your staff and makes your business a better place to work. Technology is central to this strategy, but it can be tough to get the right productivity in place. This month, we will give you a few considerations that you should pay attention to when adding technology to your roster.  

Continue reading

Ask a Tech: What’s the Deal with Ransomware?

Ask a Tech: What’s the Deal with Ransomware?

We throw around the term “ransomware” an awful lot, and while we’re confident that most people have some level of familiarity with the concept at this point, it is important that we acknowledge that not everyone has our experience in dealing with it. As such, we wanted to answer some of the questions we hear fairly often about ransomware.

Continue reading

Cloud Regulation Might Be On the Horizon

Cloud Regulation Might Be On the Horizon

Many companies, individuals, and organizations have sought to get the most value out of cloud computing, making it an industry that also requires a certain level of regulation. With its increasing integration into our daily lives, it’s no small wonder that there is a greater effort to control certain aspects of it. Here is what you can expect from cloud regulation in the near future.

Continue reading

Cybersecurity Burnout Is Real: Here’s How to Prevent It

Cybersecurity Burnout Is Real: Here’s How to Prevent It

Cybersecurity is complicated, with countless moving parts that all contribute to a well-protected network. This includes password changes, multi-factor authentication, and policies and procedures that could make the average workday a headache for the average office worker. Cybersecurity burnout is a real thing, and it’s becoming a major problem for businesses that don’t approach it intentionally.

Continue reading

You Need These 4 Cybersecurity Solutions for Your Business

You Need These 4 Cybersecurity Solutions for Your Business

Modern businesses depend on cybersecurity to help keep operations from being targeted by hackers and other cybercriminals. Businesses need to be both resilient and agile in how they protect their infrastructure from these threats. Let’s discuss four of the most important ways your business can protect itself from the growing threats of malware, ransomware, phishing attacks, and other cybersecurity threats.

Continue reading

Phishing Can Be a Nightmare…Here’s How to Wake Your Business Up

Phishing Can Be a Nightmare…Here’s How to Wake Your Business Up

Phishing is amongst the most dangerous modern attack vectors, with absolutely no sign of this changing. These attacks are always getting better, more polished, and harder to spot, making them a real nightmare for your business’ cybersecurity. Let’s talk about how the nightmare plays out, and how you can help keep your team alert to such events.

Continue reading

What Can Businesses Learn from Schofield’s Laws of Computing?

What Can Businesses Learn from Schofield’s Laws of Computing?

We frequently write about topics in relation to business IT, but one that we have yet to cover is Schofield’s Laws of Computing. What are these laws, and what can businesses learn about them?

Continue reading

Your Password Can Probably be Cracked Faster Than You’d Think

Your Password Can Probably be Cracked Faster Than You’d Think

Whether you’re talking about identity theft, data breaches, or any other form of cybercrime, one of the leading causes of successful cyberattacks is the use of insufficiently secure passwords. Just how easy is it for someone to bypass such a password? Let’s consider the facts.

Continue reading

Internet of Things Security: Important for Home and Business Networks

Internet of Things Security: Important for Home and Business Networks

The Internet of Things is pervasive in the way that many devices which you might not expect to be connected are, in fact, connected to the Internet. Smart speakers, smartphones, smart appliances, you name it, could potentially be a security threat if left unchecked. This doesn’t just go for businesses, either; even consumer smart devices could leave users vulnerable.

Continue reading

4 Security Topics to Keep In Mind During the Onboarding Process for New Hires

4 Security Topics to Keep In Mind During the Onboarding Process for New Hires

All companies have policies in place which govern how their employees use their technology, so it makes sense that any new employees should be onboarded in accordance with these expectations. Let’s go over how you can make sure your new employees know and understand your organization’s policies as they relate to business technology.

Continue reading

Are You a Cybercrime Target?

Are You a Cybercrime Target?

We focus a lot of our attention on securing our clients’ computing infrastructures from the large amount of threats that are out there. We look to legitimately protect the entire network and infrastructure with our tools and expertise. The hackers, on the other hand, understand that they are more apt to be successful if they target certain users of your organization. Let’s look at a potential profile of someone that a savvy hacker would like to target.

Continue reading

Don’t Fall Behind on Your Cybersecurity

Don’t Fall Behind on Your Cybersecurity

Any business that uses information technology needs to be considerate of its security. It’s also important for these businesses to remember that this security is always being innovated upon to better protect their organizations and their users.

Let’s consider why this constant innovation needs to be something that your organization emulates where its cybersecurity policies and processes are concerned.

Continue reading

You’ve Been the Victim of a Cyberattack: What Do You Do Now?

You’ve Been the Victim of a Cyberattack: What Do You Do Now?

If you find yourself in a position where your business has been hacked, it can be devastating for productivity and efficiency, not to mention the security of your company’s assets—personnel or otherwise. It’s quite easy for even seasoned professionals to expose themselves to these attacks, so how should you respond if you’re the one who has been hacked? That’s what we’re going to discuss today.

Continue reading

What You Need to Do to Better Secure Your Cloud-Hosted Data

What You Need to Do to Better Secure Your Cloud-Hosted Data

The cloud has become a hugely popular resource for businesses of all sizes to lean on for a multitude of needs, many using it for some form of data storage. While using the cloud for this means, however, it is wise for you to do everything available to secure the data you’ve stored there. Let’s go over a few things that we recommend you do to help protect your data.

Continue reading

Yes, Your Antivirus Needs to Be Updated… Here’s Why

Yes, Your Antivirus Needs to Be Updated… Here’s Why

Antivirus solutions are often thought of as something you implement, then forget about as time goes on. The issue with this is that, while you might forget that the antivirus is protecting you, hackers are not, and they are always on the lookout for ways to get around your systems, whether that is straight through your protections or a more roundabout approach.

Continue reading

Email Encryption Keeps Prying Eyes Off of Your Messages

Email Encryption Keeps Prying Eyes Off of Your Messages

Email is crucial to the success of any business, but it also might contain sensitive information that is meant for the eyes of your organization—and its clients—only. Most modern email platforms give you tools you need to secure your email solution, so let’s go over how you might enable these features and what they look like.

Continue reading

Today’s Businesses Shouldn’t Go Without a VPN

Today’s Businesses Shouldn’t Go Without a VPN

Let me ask you a question: how do you balance the prevalence of remote work with the fact that a lot of company resources should only be stored on-site? A VPN—or virtual private network—provides the answer for many businesses. Let’s examine what a VPN actually is, and how it helps to protect your business’ data as you access it from outside of your business’ secure network.

Continue reading
Request a Consultation

Quercus IT strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
Contact Us

Learn more about what Quercus IT can do for your business.

2-15015 123 Ave NW,
Edmonton, Alberta T5V 1J7

Call us: (780) 409-8180

News & Updates
Wow, it has been busy these last couple of months! We've gone through many iterations of our public Website over the last 17 years, with this one having the most content. Our hope is that you can find the information you're looking for, so you can ma...
Web Analytics