Heading

Heading

Heading

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Latest Articles

Search keywords

Filter by categories

Ransomware 101: Steps to Prevention & Rapid Recovery
Security

Over the past few years, ransomware attacks have been growing at an exponential rate, causing concern for businesses of all shapes and sizes. Let's dive into what it is and the potential impact on your organization.

Read More
Why Penetration Testing is Crucial for Your Cybersecurity Strategy
Security

With the rapid rise in cyber threats, it’s crucial to ensure your organization’s systems and applications are secure by continually testing and improving security measures. That's where penetration testing comes in.

Read More
BaaS 101: The Business Case for Backup as a Service
Managed Services
Security

Backup as a Service is a cloud-based solution that allows organizations to back up their critical data to a remote, secure location.

Read More
‍Lessons in CyberSecurity: The Indigo Ransomware Attack
Security
News

Book lovers across Canada had cause for concern this February as Canada’s leading retailer of literature, Indigo, experienced a ransomware attack that exposed sensitive banking information to cybercriminals. 

Read More
When Servers Go Down: Calculating the Impact on Your Business
Security
Cloud
Managed Services

When servers go down, it can be extremely costly to an organization—both on their finances and their reputation. But what is the reasoning behind those losses, and how can we calculate the potential risk?

Read More
Now Hiring—Solutions Architect in Calgary or Vancouver
Careers
News

The Solutions Architect collaborates with client stakeholders, sales and other technical resources to design proposed technical solutions that accurately address and align with the client's business requirements.

Read More
Now Hiring—Network Consultant, Remote
Careers
News

The Network Consultant works in a collaborative method with clients and peers to design and deliver IT projects through all project phases, including presales.

Read More
Now Hiring—Account Executive in Vancouver
Careers
News

Account Executives at IX Solutions are relied on to be a key conduit to clients and help IX Solutions understand their business requirements to best align the products and services we offer with those needs.

Read More
Calbridge Homes Ltd. Strengthens Backups and Fortifies Network with 360° Cyber Security Overhaul
Security
News

Beginning with a 365° assessment of the organization’s security posture, IX Solutions worked alongside Calbridge Homes Ltd. to fortify their network and enhance security protocols.

Read More
Cyber Insurance 101: What You’ll Need Before You Apply
Security

60% of Canadian companies have a cyber insurance policy in place. As applications for policies rise, so to do risk levels—causing insurance companies to become more and more diligent about who they’ll cover and what requirements must be met to do so.

Read More
The Road Ahead for IX Solutions
News

Announcing IX Solutions Managed Services! As an extension of your IT team, our hope is to put valuable time back in your hands—reducing day-to-day maintenance and monitoring so your people can remain focused on driving strategic initiatives.

Read More
Why Managed Services Providers (MSPs) are an IT Team’s Best Friend
Managed Services

Over the past few decades, the pace at which technology changes and data proliferates has continued to heighten. As a result, IT teams are challenged to keep up with everyday duties while also leading strategic change initiatives. That’s why many IT teams have turned to outsourcing. 

Read More
5 Common Causes of Data Breaches & Easy Ways to Avoid Them
Security

Cyber security should be built into your business technology from the ground up—but even then, regular maintenance and security hygiene are necessary to avoid a cyber attack. In this article, we’ll review five of the most common causes of a data breach and ways you can fortify your organization against risk. 

Read More
What is Patch Management? Benefits and Best Practices
Security
Managed Services

Patch management is an IT function that involves monitoring, identifying, testing and installing patches—a term used to describe system and code updates intended to make improvements or resolve security vulnerabilities and bugs within a software program. 

Read More
What is Zero Trust Security?
Security

Zero Trust is based on the principle that all users—whether they’re inside or outside of an organization—are never trusted and must undergo authentication, authorization and continuous validation before being granted access to business information. 

Read More
What is Mobile Device Management (MDM)?
Security
Productivity

If lost, stolen or hacked, mobile devices become major risks to business data and information security. This is why an effective mobile device management (MDM) strategy is critical and top-of-mind for many IT leaders today. 

Read More
How to Build a Conditional Access Policy
Governance
Security

Let's dive into the basics of setting up a Conditional Access policy and review common examples that may be useful to your business. 

Read More
Top IT Trends & Predictions for 2023
News

2023 is forecasted to behold some big trends in technology that CIOs and IT leaders should be preparing to navigate now—not later. Here’s our roundup of the top big-picture trends for IT leaders to keep on their radar. 

Read More
IX Solutions Case Study — City of Kamloops
News
Managed Services

IX Solutions has led the design, migration and implementation of several facets of the City of Kamloops' technology ecosystem—including the modernization of their servers and data centres, software solutions, and their entire hardware fleet. 

Read More
How to Secure your Microsoft 365 Environment with Conditional Access
Governance
Security
Cloud

Microsoft has tackled remote work challenges with device identity-driven signals. Conditional Access is at the heart of it all—compiling these signals to enforce organizational policies and strengthen security.

Read More
Key Takeaways from IT Leaders at the 2022 IXS Security Summit
News
Security

We all walked away from the 2022 IXS Security Summit with new ideas and insights. Here are the five key themes that emerged from discussions with senior IT security leaders.

Read More
IT Managed Services vs. IT Professional Services—What’s the Difference?
Managed Services
Professional Services

IT service providers are typically hired to deliver either Managed Services or Professional Services. While the two are closely related, they have some critical differences. Let’s dive in.

Read More
The Employee’s Guide to Spotting Phishing
Security

As cybercriminals get increasingly sophisticated with their methods and guise, it’s trickier than ever to spot a phishing attack—leaving businesses at an increased level of risk. 

Read More
Why Businesses Choose SharePoint for Enterprise Content Management (ECM)
Cloud
Productivity
Governance

So you’ve gone paperless—but now what? With digital records proliferating each day, organizations need to find ways to effectively manage their corporate information. Enter SharePoint.

Read More
What the Uber Hack Teaches us About the Importance of MFA
Security
Governance

Here are the top three things the Uber hack can teach us about multi-factor authentication (MFA).

Read More
IX Solutions Welcomes Anna Burleigh, Account Executive
News

A self-proclaimed people person and lover of all things process, Anna Burleigh is joining the IX Solutions team as an Account Executive—and we couldn’t be more excited to welcome her to the team.

Read More
5 Benefits of Microsoft 365 for Businesses
Cloud
Productivity

If you’re looking to upgrade or switch from other productivity platforms like the G-Suite, here are a few of the benefits you’ll realize with Microsoft 365 for business.

Read More
How Microsoft Purview is Changing the Data Governance Game
Governance

Microsoft Purview is a governance portal that provides a unified approach to data governance, helping you manage information from all sources across your organization including on-premises, multi-cloud, and software-as-a-service (SaaS).

Read More
What is Secure Access Secure Edge (SASE)?
Security
Cloud

SASE combines both networking and security capabilities into a cloud-native, globally distributed exchange.

Read More
Do you need a third-party backup solution with Microsoft 365?
Security

It's an age old debate: are third party backups required for Microsoft 365 services? To answer the question, let's start by examining Microsoft's backup solutions.

Read More
IX Solutions Welcomes Keith Hind as Technical Director, IT Services
News

Keith Hind has joined IX Solutions as our Technical Director, IT Services.

Read More
It’s Time for Microsoft Basic Authentication to Go—and Here’s Why
News
Security

Microsoft is turning off Basic Authentication in Microsoft tenants on October 1. Here’s what you need to know.

Read More
IX Solutions Welcomes Jenn Muir as Manager, Professional Services
News

As we continue to grow our team to better service our customers, we’re excited to welcome Jenn Muir to IX Solutions as Manager, Professional Services.

Read More
IX Solutions Welcomes Chris Lotsberg, Senior Project Manager
News

The IX Solutions team is thrilled to welcome Chris Lotsberg to our team as a Senior Project Manager.

Read More
Announcing our rebrand: A letter from Shawn Jackson, President of IX Solutions
News

Discover the new IX Solutions brand, what it means to our team, and how we got here in this personal letter from Shawn Jackson, our President and Founder.

Read More
Coffee corner: Staying ahead of IT security threats with Chris King, VP Sales
Security

Join Chris King, Vice President of Sales and Partner at IX Solutions for a brief update on the conversations he's having with business leaders around security.

Read More
Improve your productivity with Microsoft Viva Insights
Analytics
Productivity

Microsoft Viva Insights enables executives, managers and workers to focus on what matters most with insights derived from your Office 365 usage.

Read More
Mobile Device Security with Intune
Cloud
Security

Intune is a cloud-based service in the enterprise mobility management (EMM) space that helps enable your workforce to be productive while keeping your corporate data protected.

Read More
Defender for Office 365 Protection
Security

The simple fact is that no technology will prevent all phishing attempts from reaching the end user, so educating end users to be aware of what a phishing attempt looks like, and what to do when they suspect an email is bad, is key to protecting your environment.

Read More
Introduction to Microsoft Defender for Endpoint
Security

Microsoft Defender for Endpoint is an Endpoint Protection solution that gives visibility into your devices and proactively prevents threats. Learn more about how Defender for Endpoint can help improve your organization's security posture.

Read More
Is Your Microsoft Teams Site Secure? Revisit Your Teams Configuration to Find Out
Security
Productivity

Microsoft Teams comes with built-in security features. However, many organizations who launched Teams quickly may have done so without configuring the security settings to align with their organization’s third-party sharing or information governance policies.

Read More
Top 4 Benefits of Azure Sentinel for Threat Detection and Remediation
Security

Azure Sentinel makes threat detection and response smarter and faster with artificial intelligence (AI). Here are the top benefits you’ll discover with Azure Sentinel.

Read More
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.