top of page
All Posts


Navigating the Cost and Implications of a Data Breach
This piece discusses key insights and implications of the 2023 Cost of a Data Breach Report. Gain valuable recommendations on how companies can proactively navigate the financial risks associated with breaches and safeguard their operations and reputation.

Cyndi Tai
Aug 3, 20233 min read


Ransomware Attacks
Ransomware casts shadows over businesses, jeopardizing data and operations. Hackers use these to encrypt data demand ransom. Prevention means a multi-front defense that include robust endpoint security, vigilant filters, and fortified networks. Learn how to counter these threats with effective strategies.

Mathieu QUERE
Aug 1, 20232 min read


Unveiling the Culprits: The Most Common Causes of Data Loss
Data loss poses a significant challenge for companies, with detrimental effects on their financial well-being, reputation, and legal compliance. In this article, we delve into the prevalent culprits of data loss, aiming to raise awareness about these factors and stress the importance of proactive prevention strategies.

Cyndi Tai
Jul 6, 20232 min read


Disaster Recovery and Data Backup Tips
Disasters wreak havoc, jeopardizing crucial data and business stability. Disaster recovery and data backup are vital for continuity. Our article emphasizes their significance and offers key tips. Learn the value of a comprehensive plan, regular data backups, testing, cloud-based solutions, and employee training. Protect your business, minimize impact, and ensure a swift recovery from data loss.

Mathieu QUERE
Jun 28, 20233 min read


Identity and Access Management: An Imperative Component of Cybersecurity
Advancements in digital technology have revolutionized our lives, but they’ve also brought new security risks. That’s why Identity and Access Management (IAM) is crucial for modern cybersecurity. IAM involves managing digital identities to ensure proper resource access. This article highlights the best practices for IAM adoption to improve your organization’s security posture.

Mathieu QUERE
Jun 19, 20232 min read
State of IT Monitoring 2021-2023 Survey Report
This report outlines study results on the current state of IT monitoring. While there’s room for improvement, the significance of effective monitoring is widely recognized. Rising budgets indicate organizations understand the need to enhance monitoring capabilities as they expand their IT offerings. Future priorities include KPI monitoring, Cloud integration, and IoT/Edge expansion.

Mathieu QUERE
Jun 8, 20231 min read


Cloud Computing: A Game Changer in the Tech Industry
Cloud computing has revolutionized data storage and management for organizations, along with transforming application and service delivery. By storing information and software on remote servers instead of local computers, cloud computing enables easy accessibility from anywhere via the internet. This shift brings numerous benefits, including scalability, flexibility, cost reduction, and enhanced security. Additionally, cloud computing empowers organizations to adopt new techn

Mathieu QUERE
Jun 5, 20232 min read


How to Extract the Mailbox Size using PowerShell
Learn how to extract mailbox sizes using PowerShell effortlessly. Copy and paste the code provided to PowerShell and follow the prompts. You can obtain the mailbox size of an individual user or generate a comprehensive CSV report for the entire organization. Stay organized and gain valuable insights into mailbox management.

Mathieu QUERE
Jun 1, 20235 min read


A Comparative Analysis of Microsoft Office 365 vs. Google Workspace
Microsoft Office 365 and Google Workspace excel in collaboration and communication, but differ in key areas. Google emphasizes real-time collaboration, simplicity, and seamless integration. Microsoft offers feature-rich applications, advanced customization, and deep integration with its ecosystem. Assess unique needs, collaboration requirements, and existing infrastructure to choose the suite that empowers your team and drives success.

Cyndi Tai
Jun 1, 20233 min read


The Importance of Network Monitoring in Business Operations
Efficient network monitoring is crucial for businesses in the digital age. It enhances network performance, identifies security threats, minimizes downtime, facilitates compliance, and aids in planning and budgeting. Proactive monitoring allows businesses to detect issues before they impact operations, protect sensitive data, meet regulatory requirements, and optimize their network infrastructure. It is an essential practice for achieving business objectives and staying compe

Mathieu QUERE
Apr 14, 20232 min read


Best Practices for Secure Remote Work
The shift to remote work has introduced new security threats for organizations. To protect sensitive information and maintain system integrity, businesses should adopt best practices for secure remote work. These include providing adequate training, implementing MFA, utilizing VPNs, adopting encryption, maintaining regular software updates, monitoring access, staying informed about security trends, and regularly assessing security posture. Prioritizing remote workforce secur

Cyndi Tai
Apr 13, 20232 min read


How to deploy the Microsoft Intune Application on Windows 10 Devices
This article guides IT Professionals on deploying Microsoft Intune applications on Windows 10 devices in corporate or lab environments. It advises trying a test application deployment using a known MSI file format, such as 7-zip or Adobe Reader. For setup.exe files, conversion to MSI format is necessary using a third-party application packager. The step-by-step process includes package preparation, filling in mandatory fields, assigning application availability, and finalizin

Mathieu QUERE
Mar 23, 20232 min read


Managed IT Services: A Solution for Small Business IT Challenges
Managed IT services offer a solution to small businesses facing IT challenges. By outsourcing IT support, businesses can access expertise, cost-effective solutions, increased productivity, proactive maintenance, and enhanced security. With a team of experts handling hardware, software, network monitoring, and cybersecurity, small businesses can focus on core responsibilities while staying ahead in technology. It’s a smart investment for optimized operations and business growt

Cyndi Tai
Mar 23, 20232 min read


Reimagining Cloud Security for the Modern Business Landscape
Cloud computing brings numerous advantages such as agility, scalability, and cost savings, but it also presents new security challenges. Businesses must shift from perimeter security to a data-centric security approach. This involves prioritizing data protection through encryption, access controls, and security-focused processes. Network segmentation and staying updated with security developments are vital. By adopting a risk-based approach, businesses can securely leverage c

Mathieu QUERE
Mar 23, 20232 min read


Cybersecurity Solutions: Protecting Your Business from Online Threats
Cybersecurity is crucial for businesses due to the severe consequences of cyber attacks. Protecting sensitive information, preventing data loss, complying with regulations, and facilitating business growth are key benefits of cybersecurity solutions. With the rise of remote work, secure access to company resources is essential. Implementing the right cybersecurity measures ensures peace of mind and safeguards your business from the distress of cyber attacks.

Mathieu QUERE
Mar 23, 20232 min read


NOC service for a Large IT provider
A large IT provider needed a partner with 24×7 monitoring capabilities. Their customer is an asset management firm with over 200 network equipment spread over 12 countries

Mathieu QUERE
Sep 10, 20211 min read


An International School in Hong Kong
An international school in Hong Kong needed help with the IT infrastructure of their 4 campuses. The goal was to standardize, improve and secure their IT systems
We had to build the IT infrastructure in one new campus from scratch

Mathieu QUERE
Jan 17, 20201 min read


Large Accountancy Firm
The headquarters of a large accountancy firm did not have proper control over their affiliate offices in terms of IT management.

Mathieu QUERE
Jan 2, 20201 min read
bottom of page

