Sitemap
Pages
About
Angel Core Clients
Backup and Disaster Recovery
Blog
Book A Free Consult
Book It Security Audit
BSC Solutions Group
Careers
Cloud Computing
Contact
Controlled Goods Program
Cyber Security
Cyber Security Defense Resources
Cyber Verify AA Rating
Cybersecurity Checklist Download
History
IT Support Services
Master Service Agreement
Microsoft
Microsoft Teams Phone
MSP Verify Certification
Network Installations
NEWT Phone System
Office 365 Migrations
Our Solutions
Phishing Security Testing and On-line Training
Purpose and Vision
Report
Request a Quote
Request a Quote Microsoft Teams Phone
Request a Quote NEWT Phone Sytem
Resources
Sitemap
Subscribe
Supported Causes
Testimonials
Thank You
Thank You – Contact Us
Thank You – Cyber Security Assessment
Thank You – Cyber Security Strategy
Thank You – Disaster Recovery
Thank You – Microsoft 365 Voice
Thank You – Newsletter Subscription
Thank You – NEWT Phone System
Thank You – Report
Thank You – Request a Quote
Toronto Points of Interest: Bovaird House
Toronto Points of Interest: Casa Loma
Toronto Points of Interest: Chinguacousy Park
Toronto Points of Interest: Fort York National Historic Site
Toronto Points of Interest: Humber River
Toronto Points of Interest: King’s Mill Park
Toronto Points of Interest: Kiwanis Memorial Park
Toronto Points of Interest: Lake Aquitaine Park
Toronto Points of Interest: Leslie Log House
Toronto Points of Interest: Meadowvale Conservation Area
Toronto Points of Interest: Sheldon’s Lookout
Toronto Points of Interest: Toronto Museum of Contemporary Art
Toronto Points of Interest: Wet ‘n’ Wild
Why BSC
Posts
“Smart Home” Tips for Protection While You’re Away
10 Most Successful Online Scams to Watch out For
14 Benefits of a Windows Domain Controller Server
14 Tips for Better Zoom Business Meetings
20-Point Cyber Security Checklist for Small and Medium Organizations
2018 Cost of Data Breaches – $654 Billion
25 Most Dangerous Passwords in 2019
25 Worst Passwords of 2022
3 Reasons to Love the latest Windows 10 Update
3 Useful Windows 10 Features You Might Not Be Aware Of
4 Critical Steps to Protecting Your Cloud Data
4 Ways to Improve Your Android Phone Experience
5 Common Battery Charging Myths
5 Disaster Planning Tips for your Organization
5 Tips For Best Business WiFi Performance
6 Basic Tips to Secure WordPress Website
7 Clues to Spotting a Scam Website
7 Critical Components of a Cyber Security Strategy
7 Red Flags for Identifying Email Scams
8 Cybersecurity Tips for Working from Home
8 Ways Voice-Activated Technology Can Improve Your Business
All You Need to Know About Cloud Storage Security
Android 7 Devices Increasingly Problematic
Android Pay Now Available in Canada
Apple Testing 3D Face Scanning for new iPhone
Are You Master of Your Domain?
Artificial Intelligence to Battle Against Fake News
Auto Dealers Are Prone to Cybersecurity Attacks
Basic Authentication for Exchange Online is Ending
Benefits of Multiple Computer Monitors
Beware Free Wifi. VPN is your friend.
Beware of Celebrity Death Phishing Scams
Beware of CEO Fraud: What is it and How to Detect it
Beware of Coin Mining Malware
Beware of Fake Batteries
Beware of Fake Netflix App that is Ransomware
Beware of Fake Retail Apps This Holiday Season
Beware of New Credential Phishing Attacks
Beware of Spam Text Messages
Beware of Valentine’s Day Phishing Attacks
Beware the Source of Your Internet of Things (IoT) Devices
Bill 88 Electronic Monitoring Policy
Bill Gates’ Smart City
Brampton Cybersecurity Conference
Browsing the Internet? Look Out for Malvertising
BSC Free 90-Day Remote Connectivity Offering
BSC Offers New Super Easy Method to Request IT Support
BSC Offers WordPress Brute Force Login Protection
BSC Solutions Group Wins Gold in Computer and High-Tech
BSC Supports Our Place Peel Youth Shelter
Business Cyber Insurance – What You Need to Know
Canadian Companies Are Most Likely to Pay Ransomware
Canadian Company’s Solution for CO2 Capture
Canadian Cybersecurity Survey Results 2022
Canadian Data Breach Reporting Beginning November 1, 2018
Canadian Data Breach Reporting Now in Effect
Canadian Impact of Equifax Data Breach
Canadian Researcher Makes Technology Breakthrough
Carrying Too Many Loyalty Cards? Replace them with the Stocard App
Cloud Backup for your Critical PCs
Colour-coding cc’d Outlook Email How-To Video
Computer Chip Shortage Update and Effects
Computer Learning Advancing Breast Cancer Research
Computer That Can Smell Explosives
Computer Vision to Help the Blind
Computing and Global Warming
Controlling Computers with the Human Mind
Coronavirus (COVID-19), Computer Viruses and Phishing
Cyber Insurance and Ransomware
Cyber Insurance: Ransomware Extortion on the Rise
Cyber Liability Risks and Insurance
Cyber Risks for Travelers
Cybercrime Insurance Considerations
Cybersecurity Insurance to Become More Costly
Cybersecurity Threats of Tomorrow (Part 1)
Cybersecurity Threats of Tomorrow (Part 2)
Cybersecurity Tip: Lock Your Computer Screen!
Dangers of Public Charging Stations and Public WiFi
Data Breach reporting and recordkeeping requirements coming to Canada
Debating a Computer – The Power of AI
Do You Back Up Your Office 365 Data – Part Two
Do You Back Up Your Office 365 Data? – Part One
Do You Have Computer Vision Syndrome?
Don’t Buy a Business Phone System Until You Do This
Don’t Keep Your IT People in the Dark
Doxing: Should I be Worried?
E-Waste: A Growing Problem with Serious Consequences
Electric Eel Inspired Power Source
Environmental Impacts of Computing
Exciting Medical Advancement in Ultrasound Technology
Facebook Facial Recognition Technology: A Privacy Threat?
Facebook Introduces Parent’s Portal to Prevent Cyberbullying
Facebook Phishing URLs Up 176%
Facebook to Track and Display Ads to non-Facebook Users
Facial Recognition Technology Concerns
Facial Recognition technology will soon be used at major Canadian airports
Facts About Bitcoin Currency or “Digital Gold”
Fake Login Pages a Serious Threat
Fake Video and Audio an Emerging Threat
Fake Video Meeting Scams On The Rise
Ford’s Repossession System Computer
Free Office Learning Courses Now Available
Get Ready for a Man Versus Machine World
Good News COVID-19 Virus Stories
Google Assistant coming to Apple iOS
Google Auto-Enrolling Users With Two-factor Authentication
Google Maps will soon show how difficult it will be to park at your destination
Google Play Color Message App Warning
Google reminds website owners to move to HTTPS or be labelled as Not Secure
Google warns Gmail users of Phishing Email
Google will stop reading emails to help sell ads
Hands-Free, Voice-Free, Mouse-Free Technology
Here’s How Quick Hacked Credential Security Can Cause Harm
Highway of the Future: Electric Cars Powered by Electric Roads
Holographic Video Conferencing Has Arrived
Hosted versus On-Premises Phone System
How Artificial Intelligence Is Transforming Businesses in 2021
How Artificial Intelligence Technology Is Shaping the Future of Agriculture
How Crucial VPNs Are for Small Businesses
How Human Brain Cell Computers Could Change the Future
How Scammers Are Using Caller ID Technology
How The Bad Guys Can Target Your SmartPhone
How The Right IT Company Can Help Your Small Business
How to Avoid Cryptocurrency Mining
How to Benefit Most From Your IT Services Provider
How to Build a Successful MSP Partnership
How to change your Windows password – Video
How to Deal With Ransomware Attacks
How to Keep Your Corporate Credentials off the Dark Web
How to password protect a Word document
How to Protect Your Money While Online Banking
How to Set Up a Zoom Meeting – Tips For Success
How to Strengthen the Weakest Link in your Data Security
How Your Heart May Be The Key To Computer Security
How-To Video – OneDrive Files on Demand
Human Firewall: 7 Reasons Why People Are Essential to Cyber Security
Imagine Machines Repairing the Body from the Inside
Impact of Bill C-27 on Canada’s Privacy Laws
Important Changes for Office 365 Compatibility
Insider Threats to Your Corporate Data
Intel CPU Shortage Problem for Window 7 Replacements
iOS 10: Top 6 New Features Coming to iPhones
iPhone 7 is here: Dual camera, and No Headphone Jack
Is Your Business a Sitting Duck for Malicious Ransomware?
Is Your Organization Future-proofed?
IT Security in Your Supply Chain
IT Support Policy During COVID-19 Virus Period
IT Systems Disaster Recovery Checklist
It’s Tax Season: Don’t Fall for CRA Phishing Scams
Jukedeck: Artificial Intelligence That Creates Music in Seconds
Laptop Battery Dying Quickly? Consider Using Microsoft Edge
Larger Laptop Displays Are in Your Future
Last Blackberry-designed phone will be available in April
Mac Users: Beware of Increasing Numbers of Mac Malware
Make Payments With the Touch of Your Hand
Manufacturers Top Target for Ransomware Attacks
Meet Apple’s Recycling Robot: Daisy
Meltdown and Spectre Vulnerabilities
Microsoft 365 Cyber Security – Make it a Priority
Microsoft 365 Prices to Increase March 1, 2022
Microsoft Bans Easy-to-Remember and Common Passwords
Microsoft launches a new Office 365 App: StaffHub
Microsoft Offers Paid Windows 7 Extended Support
Microsoft Office 2010 Reaches End of Life – October 2020
Microsoft Office 2021 is Here
Microsoft Office 365 Name Changes
Microsoft Planner Added to Office 365 Suite
Microsoft Product Support End Dates
Microsoft Teams – Lesser Known Features
Microsoft Teams 2022 – New Features
Microsoft Teams now available to Office 365 Users
Microsoft Teams: A New Chat Service for the Workplace
Microsoft to end Vista support in April 2017
Microsoft Unveils Their First Desktop PC
Microsoft Whiteboard App Available Free for Windows 10
Microsoft Windows 11 – Who Can Get It and How
Microsoft’s New Privacy Dashboard Gives Users Control Over Their Data
Mobile Device Security: 14 Best Practices
MSP Verify Certification + Cyber Verify AA Rating
Multi-Factor Authentication Warning from Microsoft
Multi-Factor Authentication: Start Using It Now
Myths About Password Security
New Medical Robotics Allow for Needle Free Injection
New Office 365 Apps for Marketing, Invoicing, Mileage Tracking
New Petya Ransomware Attack Infects Computers Worldwide
New Privacy and Security Features Introduced in iOS 14
New Technologies That Will Soon Affect Us All
New to Office 365 – Microsoft Forms
New Updates to Microsoft Teams’ Phishing Protection
New Windows 10 Pro for Workstations Edition
Not investing in IT? Your future may be at stake.
Office 2010 & 2013 End of Support with Microsoft 365
Office 2019 Release Date October 2, 2018
Office 365 Business and Business Premium customers can now get Microsoft Access
OneDrive for Android New Features in Latest Update
Ontario teen wins science prize for tongue-controlled computer mouse
Outlook for Android End of Support Notice
Outsmart Cyber Attackers with Next-Generation Antivirus
Password Elimination: The Way of the Future
Password Management Made Easy
Payment Card Security-What You Need to Know
Positive Environmental Impacts of Computer Science
Protect Your Office 365 Data from Ransomware
Protecting Your Vehicle From Theft
QR Code Risks
Quantum Computers: An Introduction
Quantum Computing: At Once Exciting and Terrifying
Ransomware Attacks to Ramp Up in 2018
Ransomware Hits Thousands of Canadians Daily
Ransomware Statistics You Can’t Ignore
Reports of Canadian Cyberattacks Projected to Rise
Risks of Personal Computer Use for Work
Samsung S8 Smartphone: Everything you need to know
Save Time with Microsoft Bookings
Shadow IT: Why You Should Be Concerned
Simplifying Third-Party Vendor Risk Assessment
Smart Phones, Watches, Homes. What’s Next?
Snapchat, Skype, Blackberry Messenger score low on Amnesty International’s Message Privacy Rankings
Social Engineering Is A Threat To Your Business
Spam Text Messages – CityNews Interview
Spotting Malicious SMS Links
Still running Windows 7? Consider Microsoft 365
Supply Chain Crisis Affecting Everyone
Supply Chain Cybersecurity Best Practices
Support for Windows 7 to end Jan. 14, 2020
Teaching Computer Technology Ethics
Technologies To Impact Our Lives in 2019
Text Message Scams to Watch For
The Best Way to Boost Your PC’s Performance
The Cyberweapon Causing Mass Disruption
The Dark Web and Identity Theft
The First Ever Image of a Black Hole
The Moral Dilemmas of Self-Driving Cars
The Power of Microsoft Teams
The Threat Level of Dark Web Data
Three Emerging Trends that will shape Tech and Business in 2017
TikTok Security Risk Concerns
Top 10 Cyber Attacks of 2022
Top 10 Smartphone Security Measures
Top 4 Highlights from Apple WWDC 2017
Top Business Cyber Threats for 2020
Ugly Truth About Cyber Criminals and Disasters
Understanding the Value of a Managed IT Services Provider
USB Drive Data Protection
Using DNA to Store Computer Data
Virtual Assistants: Google, Microsoft, Facebook & Amazon
WannaCry Ransomware Alert
What does Microsoft know about me
What is an Incident Response Plan?
What is Bitcoin Currency?
What is ChatGPT?
What is Hybrid Cloud?
What Is Multi-Factor Authentication?
What is Penetration Testing?
What is Smishing? The Scam Targeting Your Smartphone
What is USB-C?
What Should I Do If My Computer Gets Ransomware
What To Do About Facebook Privacy
What You Need to Know About GDPR
What’s So Great About Microsoft Teams
When Will Passwords Go Away?
Who’s Responsible for Your Cybersecurity?
Why Cybersecurity Is Essential for Small Businesses
Why Endpoint Detection and Response (EDR) Is A Must For Any Business
Why You Should Care About the Quantum Computing Race
Why Your Business Needs IT Support
Windows 10 End of Life
Windows 10 Free Upgrade Expires July 29, 2016
Windows 11 2022 Update Includes Enhanced Phishing Protection
Windows 11 Releases October 5, 2021
Windows 7 No Longer Supported in 24 Months
Windows 7 Support To End In 18 Months
Windows 8.1 and Server 2012 R2 End of Life Updates
WordPress Brute Force Password Hacking
Yahoo Hack Breaches 500 Million Accounts
You Can Now Build and print 3D Objects on Windows 10 Mobile and Xbox
Zoom Meeting Cyber Risks