Blog
Make the most of your cloud infrastructure with a data lake solution
Storing and managing data is one of the most significant challenges for modern businesses—especially large corporations. The sheer volume of data most companies must wade through daily has exploded recently. Data flows in from disparate sources such as applications,...
The 2023 SD-WAN Strategic Roadmap: Advances in Network Technology
As traditional WAN networks show their age, the need to switch to cloud-based networking is becoming more apparent. Traditional network technology is bogged down by the sheer amount of data modern businesses now handle. Many on-premises data centers are slowing and...
Three recent developments in security technologies: What you need to know
Tech bills before America's Congress, NIST announces quantum cryptography algorithms, and Lockdown mode is coming to Apple iOS 16 Three recent developments in security technologies have created ripples in the IT world with effects that could be felt well into the...
Stay ahead of cyber-attacks with a software bill of materials (SBOM)
The SBOM is an essential tool in cyber defense and compliance management What is a Software Bill of Materials? A bill of materials (BOM) is a concept from physical supply chains. In essence, it's a receipt on steroids. A BOM lists identifying information about each...
OnX Reaffirms Dedication to Corporate Sustainability with Cisco Specialization
Governments and businesses worldwide are working to combat climate change through corporate sustainability practices such as the circular economy. The circular economy—commerce operating by a set of principles emphasizing reuse—is expected to reach a market value of...
Information privacy and information security: Is there a difference?
How concepts from the CIA Triad affect personal information Information security and information privacy defined While it may be easy to conflate the two, information privacy is not the same as information security. For information security professionals, the...
OnX boosts productivity as best-in-class IT solutions company
Technology geared for enterprises continues to become more complex as operational needs and client demands evolve. As a result, modern companies face many IT challenges, including managing network performance, maximizing uptime, meeting escalating cyber security...
Top six innovative communication tools in healthcare
Healthcare business operations are rapidly changing in our ever-evolving technological landscape. Communication tools in healthcare help providers keep pace with technology innovation and meet their patients’ needs. Unfortunately, many solutions create new issues for...
I just met a vuln named Follina
Happy summer, everyone! To celebrate, there’s a new Microsoft Windows zero-day vulnerability, currently classified by NVD as CVE-2022-30190, and nicknamed by the community as Follina. It exploits a flaw in the Microsoft Support Diagnostic Tool (MSDT) that uses the...
Four powerful questions to ask IT staffing partners
In recent years, the IT talent gap has become a core obstacle to technology enterprises, exacerbated by the swift pivot to remote work caused by the COVID-19 pandemic. According to Fortune Magazine, the talent gap has led to overall pay spikes of 14% or greater for IT...
How to make your IT workforce as dynamic as your infrastructure
Even as the enterprise struggles to keep up with rapidly changing technology, challenges are also mounting in another key area: finding the right people to manage increasingly dynamic and automated workflows. So how do you build an IT workforce that is as agile as your enterprise infrastructure?
Zero Trust Networks: what are they, and how do you implement one?
Your brain is constantly working to detect threats to your safety–whether you realize it or not. When visiting an unfamiliar place, your senses take in stimuli, which your brain uses to protect you. For enterprises, defensive cybersecurity systems have the same goal....
Level up your customer experience with franchise technology solutions
Speed of service is only the beginning for today's fast-casual restaurant industry. Customers also expect a comfortable and friendly experience from the moment they order to when they leave the restaurant. In an ultra-competitive fast-food environment, more...
Strengthen your cybersecurity defenses with the MITRE ATT&CK Framework
So far in this cybersecurity framework series, we’ve covered NIST CSF and ITSG-33 frameworks and CIS Controls as options for organizations to secure their IT environment. In this blog, we’ll peek behind the enemy lines of cyber crime by exploring the MITRE ATT&CK...
How CIS Controls Can Simplify Cybersecurity
Our previous blog post explored how security frameworks like ITSG-33 and the NIST Cybersecurity Framework (CSF) can help make your enterprise ransomware resistant. While there is a lot of information out there about these frameworks, the complicated steps recommended...
How do you ensure the security of your supply chain?
In July another major crypto ransomware attack occurred, this time through an enterprise software vendor called Kaseya. For many CEOs or business owners, that name might not be familiar, since many of the companies that use this software are Managed Service Providers...
Ransomware-proof your enterprise with Canada’s ITSG-33 security framework
If cyber criminals attacked your business today, would you be able to defend your data, maintain critical operations, and notify the appropriate legal authorities and partners that may be impacted? Would you even know whether your system had been hacked at all?...
What is NaaS, and what can this solution do for my enterprise?
Organizations ready to take advantage of the cloud are often held back by a needlessly complex legacy networks. Costly downtime and overworked IT staff are unfortunate side effects of on-premises enterprise systems, leading to lags and outages in day-to-day...
Let OnX navigate your journey to AWS for government
From federal agencies to local municipalities, Canadian government organizations are transforming the way they do business with help from cloud platforms like Amazon Web Services (AWS). With thousands of government entities now using AWS, departments across Canada are...
Delivering a trustworthy cloud for government service
Like most enterprises around the globe, government organizations require access to the same cloud-based innovations currently enabling digital transformation across the private sector. By leveraging these innovative tools, federal, provincial and municipal departments...
Secure business growth with an AWS Well-Architected Framework
Enterprises are facing a crucial stage in their evolution, moving from traditional products and services to a more agile digital economy that is application-centric. Although it’s showing its age, legacy infrastructure still plays a role in enterprise operations, due...
Educators embracing powerful remote learning technology through OnX, Vendor of Record for Ontario
Educators at every level of academia are recognizing the impact of remote learning technology and the value of secure online collaboration technologies that connect teachers with students. Today’s schools and universities require cutting-edge innovation to ensure...
SD-WAN advantages for your hybrid work-from-home model
The business world is still adapting to the remote work environment brought about by the COVID-19 pandemic. As a result of this new normal, the ideas of network infrastructure and application cloud migration have shifted from “maybe someday” to “when and how?” As more...
How Microsoft Workloads on AWS can enhance your enterprise cloud
Enterprise organizations are constantly seeking ways to leverage the public cloud as a driver for their bottom line and improve efficiencies. Customers have been running Microsoft Workloads on AWS for more 12 years, a testament to a platform well-known for high...
How to prepare your enterprise with AWS cloud solutions
The new digital economy demands that enterprises be flexible in order to succeed, meaning they need a nimble cloud environment that surpasses both the cost and performance of outdated legacy infrastructure. With time-to-market being such a crucial facet of the modern...
Top 5 cybersecurity actions to take right now
I’m finding that as I get older, my memory is starting to slowly fail me. You know that feeling when you walk into a room, and can’t remember what you came in there for? I know it’s not a unique experience, but it’s still pretty frustrating. Writing things down is...
Cloud-enabled security from OnX enhances your critical business applications
Networking technology and transport media are becoming smarter every year, requiring intelligent cloud computing and software-defined wide area network (SD-WAN) solutions for enterprises of all sizes. Evolving cyber threats—including phishers, scammers, malicious...
How SD-WAN security from OnX empowers critical business applications
"Work from home" has quite literally become a household term for companies across Canada and worldwide. In response, organizations are revamping their networking infrastructure to support remote workers, many of whom will continue to operate away from the office even...
The Benefits of Network as a Service (NaaS)
Multi-site organizations often struggle with the costs and complexities of managing separate wide area networks (WAN) that connect several locations. As businesses add new offices and advanced technologies to their IT infrastructure, these demands can stretch existing...
Identify IT skills gap and unlock solutions for your organization
A noticeable gap between IT job openings and trained professionals qualified to fill them has emerged over the past few years. The COVID-19 pandemic has only made it more difficult to close this IT skills gap as businesses around the world struggle to find talented...
Cloud delivered SD-WAN: 5 Solutions for defeating networking challenges
Businesses in nearly every industry and vertical are turning to software-defined wide area networks (SD-WAN) to solve their network challenges. One factor motivating the rush is the growing need to empower remote workforces. But why is SD-WAN the most sought-after...
Accelerate your migration to the cloud with unified communications as a service
Today's consumers expect businesses to be able to communicate across multiple touchpoints without any limitations. However, antiquated phone systems cobbled together with disparate IT networks can make it cumbersome—and expensive—for businesses to meet these...
F5 Vulnerabilities and Necessary Next Steps
F5 announced new vulnerabilities and fixes for both BIG-IP and BIG-IQ, including four critical CVEs. These vulnerabilities affect all BIG-IP and BIG-IQ customers, and F5 is strongly recommending all BIG-IP and BIG-IQ systems be updated to fixed versions as...
Building buy-in to move your company toward unified communications and collaboration
Your company can’t keep pace with rapidly evolving communications if your IT team is constantly troubleshooting and repairing your aging phone systems. If—or more likely, when—your existing equipment fails, the downtime could potentially cost your business thousands...
How to transform your data security program with automation
Data security remains at the forefront of concerns for CEOs, as two of the biggest breaches in Canadian history took place in 2019, with one breach resulting in the theft of the personal information of 15 million people in Ontario and B.C. A 2019 CIRA Cybersecurity...
Combining SD-WAN & NaaS to safeguard collaboration technology now and in the future
The coronavirus pandemic has changed how we work, perhaps on a permanent basis. However, remote employees operating from home or at branch offices are still struggling with inadequate wireless networks and poor bandwidth. Executives establishing remote work situations...
Four pitfalls to avoid when transitioning to cloud communications
Whether your business is running on a legacy telephone system, PBX or an on-premises UC platform, migrating your communications to the cloud is a complex process with countless moving parts to consider. To maximize the benefits of a cloud-based solution like Unified...
How to achieve a successful UCaaS migration
Whether your current operations rely on a legacy public branch exchange (PBX) phone system or an on-premises unified communications platform, adopting Unified Communications as a Service (UCaaS) can transform your business by enabling cloud-based collaboration...
Create an agile digital foundation for your mobile workforce
A nimble, on-the-go workforce requires an equally agile digital foundation to stay competitive. Considering that an unparalleled customer experience is the ultimate goal, effective communications are key in helping your organization meet rising consumer expectations...
The key factors in choosing UCaaS over traditional PBX
For decades, Private Branch Exchange (PBX) has enabled office-based employees in Canada to connect with each other and the outside world clearly. However, PBX has become an outdated choice for modern businesses compared to Unified Communications as a Service (UCaaS),...
Revolutionize the way you protect your enterprise with Cloud Disaster Recovery solutions that are documented, tested, and proven to work
Investing in a data infrastructure that’s used for daily operations is expensive, but it’s an easy financial decision when you consider all of the benefits and alternatives. Spending money on a dedicated environment that is rarely activated in order to maintain...
What to look for in a cloud security partner
Keeping a business safe from intrusion is no longer a simple matter of locking the doors at night. Cybersecurity has grown to become a significant concern for small, midsize, and enterprise-level companies alike, especially in the tumultuous climate 2020 has brought...
OnX recognized as Technology Excellence Partner of the Year by Cisco
Leading technology provider OnX announces that it has been named Cisco Technology Excellence Partner of the Year: Cloud and Data Center across Canada. Paul Khawaja, President of OnX, accepted the award on behalf of OnX at Cisco's annual partner conference, held...
Blending Hosted UC with Cisco Webex to unlock unified collaboration
As workplace trends and communication technologies evolve, it can be challenging for companies to maintain seamless interaction across channels, locations, and devices. To succeed in this era of remote collaboration, businesses need flexible enterprise communication...
How to leverage Bocada for better cloud data protection practices
The enterprise world is catching on to the fact that embracing the cloud offers the potential for greater network speed, lower operating expenses, and a new tier of technology solutions. However, despite the brave new world that the cloud makes possible, cloud...
4 ways NaaS achieves better performance for government remote office connectivity
As organizations struggle to keep up with the relentless advance of digital technology, the challenges faced by government agencies are especially intimidating. For federal, provincial, and local governments alike, tight budgets, reduction in highly skilled technical...
Tips for building a comprehensive cloud security program
Cloud technology is on the rise and is becoming more widely adopted every day. With so many enterprises transitioning their network infrastructures to the cloud, keeping their new cloud environments secure is a growing concern. Unfortunately, efforts to pin down and...
Boost your IT modernization efforts with Red Hat Ansible Automation Platform
Creation and consumption of digital data is accelerating at a rapid pace. According to Statista, worldwide data traffic is expected to top 77 exabytes per month by 2022, nearly double the expected load for 2020 and more than six times that of 2017. This alone is a...
How to realize maximum benefits from migrating to the cloud
There is little doubt that the cloud has become critical to success in business these days. As the need for data resources grows in order to meet surging demand for new services with greater reliability and security, many organizations have found that the only way...
Why e-mail could be your top data security threat
It is the rare enterprise these days that has yet to encounter a security threat. The ease with which cyberattacks can be mounted and the payoff from even a small firm, or an individual, has turned digital crime into an equal opportunity endeavor. This is why many...
Load More