Just Fix It Blog

Importance of IT Security in a Poetic form

In cyberspace, where all is code, The winds of danger often blow. From hackers lurking in the night, To malware ready to take a bite. But fear not, dear reader, for I bring A tale of how to protect your thing. Your data, files, and passwords too, Can all be safe, with...

read more
Striking a Balance with your Screen Time

Striking a Balance with your Screen Time

Limiting your Social Media Screen time and Excessive Device Usage Most of our life revolves around a phone or computer screen. As summer comes, instead of seeking new adventures, many Canadians are settling for online games, social media and new series to binge watch....

read more
Why are computer updates so painful?

Why are computer updates so painful?

Are Software Updates Necessary? From the antivirus that slows your “work from home” boot up every morning, to the smartphone lags that force you into an update, software seems so needy. You are not alone wondering if you have time for that coffee when your update says...

read more
Aboud & Associates – Faster connectivity for Remote Workers

Aboud & Associates – Faster connectivity for Remote Workers

Landscape Architecture Company in Guelph ON – Migrating servers to JFx Private Cloud for added speed and security Designers at a landscape architecture firm are heavily reliant on large imaging and mapping files to do their job. Different phases of a project can...

read more
Tune Up Your WiFi Network

Tune Up Your WiFi Network

Once the world got a taste of the internet, expanding the internet experience by making it more accessible in homes, workspaces and public spaces was the next logical step. Today, we use WiFi with a growing array of devices, such as smart TVs, printers, smart...

read more
Disaster Recovery: IT Business Continuity Planning

Disaster Recovery: IT Business Continuity Planning

With the shift of working habits due to the COVID-19 pandemic and many workers using remote access to work from home, businesses are more reliant than ever on servers and virtual private networks (VPNs). This change of pace has its benefits – it is the perfect...

read more
Cyber Insurance: A Must-Have when Ransomware is on the Rise

Cyber Insurance: A Must-Have when Ransomware is on the Rise

Cybercrime—a steadily rising threat Whether you are a large organization, or a small- or medium-sized business, cybercriminals—with fingertips perched atop their keyboards—are poised to hack into your data with malicious intent. Mainstream as it now is, the Internet...

read more
Block 99.9% of Account Hacks with Two-Factor Authentication

Block 99.9% of Account Hacks with Two-Factor Authentication

Two-factor authentication is an increasingly popular way to prevent forced login attempts from non-employees. It works by establishing a second “gate” of entry you must pass through to reach the valuable information stored on the other side; often times by sending a...

read more
Brute Force Attacks: Password Strength Matters

Brute Force Attacks: Password Strength Matters

While movies frequently portray the hacker as a command-line cowboy, fingers flying across the keyboard as they work their computer magic against whatever foe they’re facing, hacking in reality is much more mundane. Directed attacks against specific entities are rare,...

read more
Electronics Recycling: 3 Ways to Recycle Electronics

Electronics Recycling: 3 Ways to Recycle Electronics

With the amount electronic upgrades increasing worldwide each year, properly disposing of electronic waste (e-waste) is becoming even more important.  Whether upgrading a computer, gaming system, television or smartphone, ensure your business or household is not...

read more
MARK 57 – THE RETURN OF FIREFOX

MARK 57 – THE RETURN OF FIREFOX

I love Mozilla Firefox, even if I stopped using it. When I first transferred to it back in the early 2000’s, it felt like being part of a secret club; a resistance against Microsoft and their Internet Explorer. I even carried around a copy on a USB thumb drive so that...

read more
THE WPA2 KRACK

THE WPA2 KRACK

Without looking, can you tell me what security protocol your wi-fi is using? I can, but that’s because I’m a gigantic nerd; I’ve got the standard WPA2 encryption whizzing through my apartment. If you’ve recently installed a router or received a modem with built-in...

read more
IT’S HALLOWE’EN – TIME TO KILL A ZOMBIE

IT’S HALLOWE’EN – TIME TO KILL A ZOMBIE

Do you know how to tell if your computer’s a zombie? It would be really convenient if we could check for the telltale rotting flesh and shuffling gate, but when it comes to computers, it can be very hard to tell when one has been zombified.Unless you’re brand new to...

read more