Blog Image

Disaster Recovery Best Practice Recommendations for ShoreTel: Part 1

Jul 16, 2015

Their unique distributed model has multiple built-in redundancies  


Read More

Fake domain names and websites target small businesses

Jul 8, 2015

This type of scam is becoming more commonplace


Read More

Fake CRA collection scam targets companies

Jul 3, 2015

We were recently the intended victim of a pretty sophisticated fraud attempt


Read More

The scary scenario of losing company assets

Jun 23, 2015

Policies your organization can put in place to protect yourselves and the loss of data


Read More

Windows 10 should be your last

Jun 11, 2015

Microsoft has indicated a fundamental shift in the way it delivers its operating system


Microsoft 10

Safe-Guard your business with IT Policies

Jun 5, 2015

Policies and procedures businesses can have in place to safe-guard themselves from any number of unfortunate and untimely events.


Policies and procedures

Lost equipment? Avoid a security breach

Jun 1, 2015

With the number of devices we carry today for both personal and business, it can be a challenge to keep track of them.


Business Security

Who are you wearing?

May 28, 2015

Wearable technology is moving full steam ahead


Wearable Tech

Why look outside your Team for IT support?

May 1, 2015

“How can we support you today”?


IT Support

Happy Earth Day 2015

Apr 23, 2015

Keeping your business green is more important than ever…and due to the demand, easier too.


Read More

Optimize How Your Team Communicates

Apr 15, 2015

Early adopters of the new series have quickly recognized how the updated features and usability enable increased worker productivity.


Unified Communications

What is Good Customer Service?

Mar 25, 2015

We sell, supply, install and maintain a wide variety of IT products and services for our clients. How do we separate ourselves from similar companies?


What is Customer Service

Is your Network Secure? A look at traditional anti-virus and firewall solutions

Mar 10, 2015

As online threats to our clients’ networks are ever increasing, we really need to look at what's wrong with traditional anti-virus.


More on Network Security

Xirrus, making AC technology accessible and affordable

Mar 4, 2015

With an average number of approximately 3 wireless devices per person, business users are increasingly dependant on Wi-Fi.


802.11AC Technology

Message from the President of Glenbriar Technologies – Mr. Robert Matheson

Feb 26, 2015

Technology is a constantly changing landscape.  What changes do you see as having a large impact on our clients in 2015?


Read More

Why we all need to review our “Public Certificates”!

Feb 18, 2015

2015 is going to see a changing landscape towards certificates issued for public vs internal domains


Read More

Cloud …. I thought I knew what it was

Feb 10, 2015

What is a Cloud” seems to shift with every iteration of product release and product offering.


What is a Cloud?

Upcoming Tech Trend: CYOD

Feb 4, 2015

Choose Your Own Device (CYOD) is rising in popularity and may take the lead in businesses Mobility Solution of choice


Read More
1 2 3 4 5