Skip to content
DigiVie
(613) 277-2312
Facebook Twitter Linkedin YouTube
  • Home
  • About UsExpand
    • About DigiVie
    • Case StudiesExpand
      • Gifford Associates
      • Innovative Financial Group
    • Video Library
    • Testimonials
    • Join Our Team
  • CommunicateExpand
    • IP TelephonyExpand
      • 911 Service Limitations
    • Business Telephony
    • Web Conferencing
    • Work Remotely
  • Manage ITExpand
    • DigiVie IT
    • inTouch Services
    • inTouch Cybersecurity & Managing Human Risk
    • Internet Properties
    • Cloud Solutions
    • Data Protection
    • Security
    • Network Support
  • Our Blog
  • ContactExpand
    • Contact Us
    • Client Portal
    • inTouch Connect
DigiVie
(613) 277-2312
Facebook Twitter Linkedin YouTube
  • New Phishing Threat Presents Security Challenge

    New Phishing Threat Presents Security Challenge

    July 30, 2019December 8, 2019

    Phishing Attacks Target OAuth Credentials to Gain System Access Discover how an increasingly popular authentication process, OAuth, can be exploited by hackers and wreak havoc on applications and access sensitive data. What Is OAuth? OAuth is a widely used framework that allows applications to share access to assets. It lets unrelated services and servers to…

    Read More New Phishing Threat Presents Security ChallengeContinue

  • Clearing Up The Cloud – Have You Harnessed Its Strategic Advantages?

    Clearing Up The Cloud – Have You Harnessed Its Strategic Advantages?

    July 30, 2019December 9, 2019

    The cloud may still feel like a new technology – but in reality, it’s been around for more than 10 years now. Does that make you feel old? Let’s be clear about something – the cloud is here to stay. In recent years you may have still heard the occasional “industry insider” suggest that the…

    Read More Clearing Up The Cloud – Have You Harnessed Its Strategic Advantages?Continue

  • Get Your Beauty Sleep With Nightlight In Windows 10

    July 30, 2019June 25, 2019

    You may have been using Windows 10 for some time now, but it’s likely that you haven’t mastered all of its features just yet. If you, like so many others, use your computer late at night, before (or even in) bed, then you may have found that it throws off your sleep cycle. Despite being…

    Read More Get Your Beauty Sleep With Nightlight In Windows 10Continue

  • How To Download Audio From Facebook Messenger

    How To Download Audio From Facebook Messenger

    July 26, 2019July 26, 2019

    How To Download Audio From Facebook Messenger Facebook Messenger is one of the most popular chat and messaging services in the world. Increasingly, Facebook Messenger is increasingly being used to communicate using text, audio, and video. However, a common question asked by users of Facebook Messenger is how audio files can be saved from within…

    Read More How To Download Audio From Facebook MessengerContinue

  • What Is Network Segmentation?

    What Is Network Segmentation?

    July 25, 2019December 9, 2019

    What Is Network Segmentation? Businesses that offer WiFi to their customers or have sensitive data needs should consider network segmentation as a necessary component of their IT solution. With network segmentation, your wireless services are separated into different parts, allowing you to better control access and data flow. Network segmentation splits your wireless services into…

    Read More What Is Network Segmentation?Continue

  • Online Free Excel Training: Tips & Techniques For Managing Workbooks

    Online Free Excel Training: Tips & Techniques For Managing Workbooks

    July 23, 2019July 23, 2019

    Organization Shouldn’t Be Complicated Out of all of Microsoft’s Office programs, Excel is one of the most universally used. What started out as a fairly basic spreadsheet program has evolved into a must-have business tool. However, the more you use Excel, the more data your workbooks will accumulate. Keeping these workbooks organized and easy to…

    Read More Online Free Excel Training: Tips & Techniques For Managing WorkbooksContinue

  • Protect Yourself From Ransomware In Windows 10

    July 23, 2019June 25, 2019

    You may have been using Windows 10 for some time now, but it’s likely that you haven’t mastered all of its features just yet. You’ve heard about ransomware, right? It’s a type of malware that encrypts your data so you can’t access it and holds it for ransom. Usually, this malware makes its way into…

    Read More Protect Yourself From Ransomware In Windows 10Continue

  • How to Know When to Outsource IT

    How to Know When to Outsource IT

    July 22, 2019December 9, 2019

    Nearly every company must now rely on technology on a daily basis. For most companies, the role of technology will only grow in the future, making it even more important for all companies to have the tech support they need at all times. Depending on the situation, companies may hire employees to handle IT in-house,…

    Read More How to Know When to Outsource ITContinue

  • What Are the Most Serious Cybersecurity Stories of 2019?

    What Are the Most Serious Cybersecurity Stories of 2019?

    July 19, 2019December 8, 2019

    We’re only halfway into 2019, yet data protection specialists and IT analysts have already seen an unfortunate spike in criminal activity across industries. Thus far, here are the biggest cybersecurity crises of the year. 2019’s Top Cybersecurity Stories #1 – Supply chain attacks Unique to 2019 is a growing trend of supply chain attacks. Supply…

    Read More What Are the Most Serious Cybersecurity Stories of 2019?Continue

  • How Do I Choose a Cloud Computing Model?

    How Do I Choose a Cloud Computing Model?

    July 19, 2019December 9, 2019

    How Do I Choose a Cloud Computing Model? No matter what your company or organization specializes in, it’s sure that you have some form or forms of data that needs to be stored, well, somewhere. Before the invention of cloud computing, most company data was always stored on-site — that is, in the hard drives at…

    Read More How Do I Choose a Cloud Computing Model?Continue

  • What Are the Top Tips for Choosing the Best IT Company?

    What Are the Top Tips for Choosing the Best IT Company?

    July 18, 2019December 4, 2019

    What Are the Top Tips for Choosing the Best IT Company? Website outages, cybersecurity attacks, and any number of other IT incidents can cost your company hundreds or even thousands of dollars — every minute. For this reason alone, you need an outsourced IT company who is competent and highly qualified to handle your IT…

    Read More What Are the Top Tips for Choosing the Best IT Company?Continue

  • How Can You Encrypt Files and Folders in Windows 10, 8 or 7?

    How Can You Encrypt Files and Folders in Windows 10, 8 or 7?

    July 16, 2019July 16, 2019

    How Can You Encrypt Files and Folders in Windows 10, 8 or 7? You can encrypt files and folders in Windows (vers. 7-10) using BitLocker. This Vista operating system extension has on-disk encryption as well as key management capability. It’s protected by two-factor authentication, so anyone who wants to crack the code needs a hardware…

    Read More How Can You Encrypt Files and Folders in Windows 10, 8 or 7?Continue

Page navigation

Previous PagePrevious 1 … 4 5 6 7 8 … 88 Next PageNext

Latest News

  • Best Practices for Secure Data Backup

    These days, everything is digital. We deal with data every day: from personal photos to…

    Read More Best Practices for Secure Data BackupContinue

Company

B1-1002 Beaverbrook Road, Ottawa, ON K2K 1L1

(613) 277-2312

info@digivie.com

Services

Network Security
Secure Business Cloud
Data Protection
Business Telephone Systems
Managed IT

Newsletter Sign Up

Receive email updates and informative marketing materials by subscribing to our newsletter.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Copyright © 2026 DigiVie. All rights reserved.

  • Privacy Policy
  • Home
  • About Us
    • About DigiVie
    • Case Studies
      • Gifford Associates
      • Innovative Financial Group
    • Video Library
    • Testimonials
    • Join Our Team
  • Communicate
    • IP Telephony
      • 911 Service Limitations
    • Business Telephony
    • Web Conferencing
    • Work Remotely
  • Manage IT
    • DigiVie IT
    • inTouch Services
    • inTouch Cybersecurity & Managing Human Risk
    • Internet Properties
    • Cloud Solutions
    • Data Protection
    • Security
    • Network Support
  • Our Blog
  • Contact
    • Contact Us
    • Client Portal
    • inTouch Connect