Alliance Trust Company

Alliance Trust
On behalf of Alliance Trust Company, I am pleased to confirm our continued strong business relationship with the principals and staff of Computer Perfect, dating back to October 1999. In 1999, we hired Mario Argento and his business partner, Richard to assist us with the purchase and installation of computers at my previous company, Valiant Trust Company. We found them to be most helpful and knowledgeable. In addition, their professionalism and integrity was impeccable. These traits, which we...
More

UCCE

uccelogo
The Union of Calgary Co-operative Employees (UCCE) highly recommends computer Perfect as the best company for all your IT needs. We have been dealing with Computer Perfect since 1995 and have always enjoyed stellar service from them. They have exceeded our expectations and are always quick to respond to all our needs. We couldn't be happier or more satisfied with their friendly efficient service and would highly recommend them to anyone. Yours truly Pat Rose UCCE President
More

Data Backups

backup
The most important asset belonging to any business is its information. With the increasing importance of information technology for the continuation of business critical functions the importance of protecting an organizations data and IT infrastructure in the event of a disruptive situation has become an increasing and more visible business priority in recent years. It does not matter whether you are a small or large business- data is a vital part of any enterprise. It is absolutely critical ...
More

Data Protection

lockoutunwatedsites
What Information Would You Miss The Most? Accounting - Quotes - Service Records! Data is the heart of the enterprise, it's crucial for you to protect it. To protect your organization's data, you need to implement a data backup and recovery plan. Backing up files can protect against accidental loss of user data, database corruption, hardware failures, and even natural disasters. Data backup is an insurance plan. Important files are accidentally deleted all the time. Mission-critical data ca...
More

Are Cloud Storage Sites Safe

datapuzzel
Passwords can be hacked. This doesn't mean that passwords aren't safe, just that they're vulnerable to dictionary and brute force attacks. If you're cloud storage solution relies on a password to access your data, choose a password that's difficult to hack, using numbers, lower case letters, uppercase letters and special characters, and change your password often to reduce the chances of success from brute force attacks. Data can be captured while being uploaded or downloaded. Most storage se...
More

Malicious links: Spammers change malware delivery tactics

datarecovery300x224
Significant spike in malicious spam emails containing links, as attackers move away from attachments in their efforts to spread Downloader.Ponik and Downloader.Upatre. Attackers behind malicious spam campaigns have shifted their tactics in recent months and are increasingly attempting to infect victims by luring them into clicking on links rather than sending them malicious attachments. Since late November, Symantec Security Response has seen a spike in the number of malicious emails using...
More

Highlights from the 2014 Internet Security Threat Report

computer-virus
Key Findings 91% increase in targeted attacks campaigns in 2013 62% increase in the number of breaches in 2013 Over 552M identities were exposed via breaches in 2013 23 zero-day vulnerabilities discovered 38% of mobile users have experienced mobile cybercrime in past 12 months Spam volume dropped to 66% of all email traffic 1 in 392 emails contain a phishing attacks Web-based attacks are up 23% 1 in 8 legitimate websites have a critical vulnerability
More