Blog

What’s happening at Scout? Check out the most recent news, articles and upcoming events.

All Articles careers Events

Navigating the Evolving Landscape of Cybersecurity

Over the past decade, the IT/Managed Services Provider (MSP) industry has undergone a significant transformation, driven by the escalating importance of cybersecurity. This has been marked by a shift from traditional IT services to a more comprehensive approach with cybersecurity at the core of our offerings. Era of Transformation (2013-2023): Initial Focus on Infrastructure: Circa […]

Read More

Cyber Hygiene CDAP Assessment

Have you heard about the Canada Digital Adoption Program (CDAP) Grant?  I’ve seen my fair share of spam about it; however, I hadn’t seen the value for us (or our clients) until I learned about Jelly Marketing’s CDAP assessment which was a great fit for us! Fast forward only a few weeks from my initial […]

Read More

Letter to our clients – October 2020 Improvementfest

The year 2020 isn’t even over yet, and it has been loaded with enough negative press for 2 years!  I certainly struggled early in the year with finding the positive silver linings, but being the optimist that I am, I kept looking! We have all had many challenges to overcome this year, but take the […]

Read More

Protecting Against CEO Fraud

Matt Dryfhout laughing with a group, holding a drink

While most people would think twice about helping out a down on their luck Nigerian Prince, it’s a lot harder to dismiss an email that seems to be from your boss. This is what makes this type of phishing – commonly known as CEO Fraud – so effective. And it is not just CEOs. Any […]

Read More

Two-Factor Authentication

Man typing on computer with mobile phone in his hand

Multi-factor authentication (MFA) is an authentication process in which a device user is granted access only after successfully presenting two or more pieces of evidence (factors) in authentication. Two-factor authentication (2FA), also known as two-step (2-step) verification, is a type of multi-factor authentication.   Two-factor authentication is a method of confirming a user’s claimed identity […]

Read More

Hard Drive Encryption

Multiple monitors with code on the screens and a pair of glasses in the forefront

If you’re using a computer or a detachable USB, the chances are high you have sensitive data on these devices.  Your personal finances are often on your desktop at home, your laptop at work may have confidential business information or, for James Bond, you have may have a thumb drive with government secrets stored on […]

Read More

Supporting Senior Care With Technology

Several senior care home buildings forming a village

The Canadian population is ageing: by 2031, one in four people in B.C. will be over the age of 65.  That translates to more than 1.3 million people. Care homes need to start positioning themselves now to handle the significant increase in the clientele by investing in infrastructure that will allow them to meet the […]

Read More

Email Signature Solutions

Person typing on laptop with email and user icons overtop

In our previous blog post, The End of Emails, we discussed how technology has evolved to more collaborative self-organizing forms of communication. However, the reality is emails are here to stay, at least in terms of external corporate communication. Each day, the average office employee receives 121 emails and sends 40. In 2018 there were […]

Read More

What Is Cloud Computing?

Man holding laptop with cloud over top

What Is Cloud Computing? By: Matt Dryfhout and Scott Hewer Cloud computing has become an area of interest for both large and small businesses over the past few years. Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local […]

Read More

Phishing Attacks

Earth over a blue background with a lock overtop

Globally, the threat from cyber attacks is increasing both in number and intensity. According to McKinsey & Company research, billions of data sets are breached annually, and each year hackers create roughly 120 million new variants of malware. Even with the growing awareness among businesses, they are frequently unprepared for the sophistication and ferocity of […]

Read More
1 2 3