Skip to content
DigiVie
(613) 277-2312
Facebook Twitter Linkedin YouTube
  • Home
  • About UsExpand
    • About DigiVie
    • Case StudiesExpand
      • Gifford Associates
      • Innovative Financial Group
    • Video Library
    • Testimonials
    • Join Our Team
  • CommunicateExpand
    • IP TelephonyExpand
      • 911 Service Limitations
    • Business Telephony
    • Web Conferencing
    • Work Remotely
  • Manage ITExpand
    • DigiVie IT
    • inTouch Services
    • inTouch Cybersecurity & Managing Human Risk
    • Internet Properties
    • Cloud Solutions
    • Data Protection
    • Security
    • Network Support
  • Our Blog
  • ContactExpand
    • Contact Us
    • Client Portal
    • inTouch Connect
DigiVie
(613) 277-2312
Facebook Twitter Linkedin YouTube
  • The Top Little-Known Best Practices for a Secure Workstation Policy

    October 16, 2015

    Offices of all kinds in all industries have some type of a computer system that all employees rely on, in order to perform their day to day tasks and obligations. These workstations may come in the form of desktop computers, or could be employee owned laptops, but regardless, the company will have workstations of some…

    Read More The Top Little-Known Best Practices for a Secure Workstation PolicyContinue

  • Internet Scam Robs Companies of Millions

    October 16, 2015

    Hackers have found a new way to steal from companies and it has more to do with people than it does technology.  Millions of dollars have been reported stolen from large corporations and they are handing it over themselves! This is how the scam works… Hackers will target the leaders of the company, usually the…

    Read More Internet Scam Robs Companies of MillionsContinue

  • Hackers Have New Ways of Attacking Your Computer

    October 13, 2015

    We all know that downloading suspicious files is a good way to get a virus, but hackers are now able to disguise a file to make it seem harmless. They do this by changing or hiding the extension of the file. What’s a file’s extension? The extension is simply the three digit code at the…

    Read More Hackers Have New Ways of Attacking Your ComputerContinue

  • URGENT: Your Phone is Malware-Ridden

    October 6, 2015

    Have You Downloaded Any of These Apps! If you think that all of the apps on your phone are safe, think again. Recently, Apple admitted that literally dozens of apps have been affected with malware that is more than capable of obtaining your personal information, including your passwords and login information. Below is a list…

    Read More URGENT: Your Phone is Malware-RiddenContinue

  • This Thanksgiving, Count Your IT Blessings

    October 6, 2015

    Family, friends, health, and the stability of your business are all reasons to be thankful. {company} knows that the reason you’re able to keep your business running smoothly is strategic and expertly-maintained managed services. When you’re trying to relax and enjoy a holiday with your family, you need assurance that everything back at the office…

    Read More This Thanksgiving, Count Your IT BlessingsContinue

  • Are You Falling Behind?

    October 2, 2015

    Will Your Business Be Left Behind In The Race For More Effective Information Technology? Good businesses grow, expanding the size and scope of their operation, which in turn requires further resources to support expansion. This includes your {city} business’ Information Technology infrastructure, as the more employees you have and the more clients you serve, the…

    Read More Are You Falling Behind?Continue

  • Germ-Infested Devices: Taking A Toll On Your Health

    September 30, 2015

    People use their smartphones and other electronic devices on a day to day basis, giving little to no thought about just how dirty they can get collecting oils from our skin, fingerprints, dust, and all kinds of other dirty little little secrets. When you stop to think about how we are always touching these electronics,…

    Read More Germ-Infested Devices: Taking A Toll On Your HealthContinue

  • 5 Facts You Need to Know Before Choosing a Business Telephone System

    January 22, 2015May 18, 2018

    A business can’t run effectively without proper communication between employees, and the business telephone system used throughout your office is a huge part of keeping workers connected. Many businesses find themselves juggling multiple phone plans, from in-office services to several mobile phone plans. The costs, then, can grow exponentially as time goes on. A New,…

    Read More 5 Facts You Need to Know Before Choosing a Business Telephone SystemContinue

  • Four Amazing Offline Capabilities with Google Chromebooks!

    July 28, 2014

    After a rocky start, Chromebooks are starting to make a comeback.  The offline capabilities of Chrome OS are impressive, and Chromebooks are now widely available from Dell, Acer, HP, Toshiba, and Samsung at reasonable price points. Chromebooks are able to tackle many needs like sending emails and even watching movies offline. However, these capabilities are…

    Read More Four Amazing Offline Capabilities with Google Chromebooks!Continue

  • Work Remotely

    May 21, 2014

    20th century Canadian communications philosopher Marshall McLuhan once wrote, “We shape our tools and afterwards our tools shape us.” He also wrote, “Diaper backwards spells repaid, think about it.” So what are your remote colleagues thinking about? Are they working effectively or spending their days contemplating McLuhan quotations? Working remotely can be a challenge –…

    Read More Work RemotelyContinue

  • For the past 100 years or so, telephone technology has basically remained the same – pick up a phone, dial a number, and someone answers on the other end.

    May 21, 2014

    Today, the game has changed. Your business can do MORE, and do it BETTER and FASTER than ever before with a next-generation phone system. IP-PBX systems offer many benefits for your business that simply were not possible previously. To learn more, give us a call at {phone} or send us an email at {email}. IP…

    Read More For the past 100 years or so, telephone technology has basically remained the same – pick up a phone, dial a number, and someone answers on the other end.Continue

  • inTouch Backup

    April 28, 2014

    If all of your critical files were lost or stolen, would your business survive? Data is the life-blood of the vast majority of organizations. If you don’t have a reliable backup and disaster recovery plan in place, a natural disaster, database corruption, or hardware failure could result in permanent data loss. DigiVie’s inTouch Backup includes…

    Read More inTouch BackupContinue

Page navigation

Previous PagePrevious 1 2 3 4 Next PageNext

Latest News

  • Best Practices for Secure Data Backup

    These days, everything is digital. We deal with data every day: from personal photos to…

    Read More Best Practices for Secure Data BackupContinue

Company

B1-1002 Beaverbrook Road, Ottawa, ON K2K 1L1

(613) 277-2312

info@digivie.com

Services

Network Security
Secure Business Cloud
Data Protection
Business Telephone Systems
Managed IT

Newsletter Sign Up

Receive email updates and informative marketing materials by subscribing to our newsletter.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Copyright © 2026 DigiVie. All rights reserved.

  • Privacy Policy
  • Home
  • About Us
    • About DigiVie
    • Case Studies
      • Gifford Associates
      • Innovative Financial Group
    • Video Library
    • Testimonials
    • Join Our Team
  • Communicate
    • IP Telephony
      • 911 Service Limitations
    • Business Telephony
    • Web Conferencing
    • Work Remotely
  • Manage IT
    • DigiVie IT
    • inTouch Services
    • inTouch Cybersecurity & Managing Human Risk
    • Internet Properties
    • Cloud Solutions
    • Data Protection
    • Security
    • Network Support
  • Our Blog
  • Contact
    • Contact Us
    • Client Portal
    • inTouch Connect