1-888-300-4810
Serving Greater Vancouver and the Fraser Valley
info@tsgcs.ca

Blog

SCAM ALERT – Rogers Communications Outage Scam

I think it bears repeating, do not click on any link sent to you by text message or email from Rogers claiming to credit you for the recent Canada-Wide outage. You may not even be with Rogers – scammers don’t know this information so people on other networks still click to see if they can […]
Read More

6 Best Computer Diagnostic Tools

With the advancement in technology, everything has become digital. Manual processes are being automated, the education system has embraced the use of technology, and many other major transitions have made computers an integral part of our daily work. People from all walks of life use the computer for work and entertainment alike. Computer errors thus […]
Read More

Importance of Server Security

Servers are responsible for ensuring that the employees, management, customers, and partners have constant access to the company’s services. A server is at the heart of all business activities such as Data Access and Storage, Applications, File and User Control, Remote Accessibility, etc. As such, Servers are seen as a vital part of any IT […]
Read More

Malware attacks are evolving; Evolve Your Protection

Enterprises in the present world are falling prey to hackers more often than before; making malware protection a critical element for business’ success. There is more news of businesses going down due to faulty malware protection than before. Viruses, Trojans, phishing and spear-phishing attacks, and email security threats are among the significant risks confronting organizations […]
Read More

Testimonial 13

"From the day we hired TSG Computer Services to look after our IT services, we have been very pleased with the services they have provided to us. Chad and his staff are very professional, knowledgeable, and always there to help even during the weekends and off-hours. I would highly recommend them." – Ranil Waliwitiya, CEO […]
Read More

Computer network setup: the best configuration for your business

Developing a properly configured computer network is a primary requirement when you are expanding your business. Many companies, when they begin, don’t feel the need for an elaborate network setup, and they may be right. However, with the threat landscape changing so rapidly, it quickly becomes an eventual necessity. At some point, a robust network […]
Read More

cPanel 2FA bypass vulnerability found

Digital Defense researchers have found a new two-factor authentication (2FA) bypass vulnerability which affects the cPanel and WHM (WebHost Manager) Software Suite. According to Digital Defense, the vulnerability may allow attackers to access secured accounts. The vulnerability was patched last week by cPanel and WHM. Web hosting providers should have upgraded their installations by now. […]
Read More

How to Use Hardware and Software Encryption to your Advantage

Keeping data files secure is an integral part of cybersecurity. It is one of the key security measures that most individuals take to prevent their files from being opened by other parties. It also keeps the contents safe from different malicious programs. An encrypted file is completely unreadable if the reader does not have the […]
Read More
TSG