Author: Ty Hedden

Your IT needs engagement now

One of the most interesting positive side effects of the pandemic that I have noticed over the past year is the growing engagement between business owners and their technology. This heightened awareness of just how dependent on technology even the simplest of...

The convenience versus security spectrum

Many business leaders are recognizing that how their employees work and where they are working from is beginning to shift. Business is migrating more and more to the cloud all the time. The days of when all data was stored on a server in the back room is quickly...

Work from home security check up

Just six months ago, the potential impacts of COVID-19 were just becoming clear to everyone. Retail sales in Canada had dropped by 10% (which is substantial) and dipped to a five-year low by April. The Canada-U.S. border closed for the first time since confederation...

The work from home transition

In this blog post, we uncover what we have identified as the three stages of the work from home transition. We paint a picture of the workplace of the future, one no longer confined to the four walls of a traditional office while unpacking some of the competitive...

Security and Remote Work

Businesses that can operate remotely are moving in that direction. At Smart Dolphins, we saw many Vancouver Island employers request that employees begin remote work last week. Some organizations are still in the process of transitioning to a work-from-home...

Getting started with Microsoft Teams

What do I need to get started with Microsoft Teams? With Microsoft Teams becoming increasingly popular with small business we are finding that many business leaders are wanting to dive in but are unsure of what they need in place before they can create their first...

Beware of email phishing requests

Reduce exposure to spear fishing Spear phishing is alive and well and hackers are targeting our business community in sleepy Victoria, BC. Hackers lurk in the shadows targeting local businesses. They watch and wait for the most opportune time to prey upon them. ...

Why Encryption?

Encryption transforms data into a locked format that cannot be read without a key.You can encrypt stored data, data en route for communications and devices that may be used for storage. To unlock encrypted data, you need a key. Encryption is the best defense against...

Shadow IT

Shadow IT is likely a new term for most of us. It refers to technology, usually software or devices, introduced and used outside the awareness or control of IT management.

Check for data breaches

Want to know if your login credentials have been breached? Check out Have I Been Pwned: https://haveibeenpwned.com "Have I Been Pwned" is a specialized search engine which allows you to check your email address against known data breaches to tell you if you have been...