Rivercity Technology Services LTD Logo
About Us
Services
Icon showing a support technician
IT Support Services
Cybersecurity Risk Management at one predictable flat rate.
Icon of light bulbs on a laptop screen
IT Consulting
Business optimization through the smart use of technology.
Icon showing a hand holding a phone
Business Phone Services
VoIP Telephone solutions from RCT. 
Icon showing a database and a cloud
Backups & Recovery
Cloud & On Premise - ready to recover!
Icon showing website wireframes
Website Development & Hosting
Web design and full hosting & maintenance packages!
Icon showing an envelope being opened
Modern Email Management
Microsoft 365 email provisioning, security & management.
Icon of a magnifying glass inspecting binary code on a computer screen
Cybersecurity Risk Assessment
Internal auditing to help identify potential cyber threats.
“You’re giving me the ‘it’s not you, it’s me’ routine? I invented ‘it’s not you, it’s me.’ Nobody tells me it’s them not me; if it’s anybody, it’s me.”
- George Costanza
Learning CenterNewsletterContact Us
Book A Consultation

The Monthly Download—March 2025

Do your cyber security plans fall short?

When it comes to cyber security, many SMBs are caught off guard. Not only when cyber attacks happen… but also by what to do next.

A solid cyber security plan isn’t just about preventing attacks. It’s about knowing how to respond if the worst happens.

Cyber attacks often target smaller businesses because criminals know they’re less likely to have robust defenses in place. The most common threats include phishing (fake emails or messages that trick you into sharing sensitive information) and malware (malicious software that can steal data or shut down your systems).

You can’t stop these risks entirely, but you can reduce your chances of being hit by:

Training your team: Make sure everyone knows how to spot phishing emails, avoid dodgy downloads, and use strong passwords. This is your first line of defense.

Keeping software updated: Regular updates for apps and systems fix security flaws that cyber criminals might exploit.

Using Multi-Factor Authentication (MFA): This adds an extra layer of security, like a one-time code sent to your phone, making it harder for attackers to get in.

But even the best defenses aren’t foolproof. That’s why your cyber security plan also needs to cover what happens if you’re attacked. Without a plan, an incident can cause panic, downtime, and serious financial loss.

Here’s what you should have in place:

A response team: Decide in advance who will handle the situation - your IT team, an outside expert, or both?

Backup systems: Regularly back up your data and store it securely. If ransomware locks your files, backups can mean you won’t lose everything.

A communication plan: Know how you’ll inform your team, customers, and any necessary authorities about the breach.

Remember, cyber security isn’t just for big companies. A single attack could be enough to seriously damage your business. By planning ahead, you’re not just protecting your data, you’re safeguarding your reputation and your future.

We help businesses create their own plans for defense and remediation. If we can help you too, Get in touch.

What's happening at RCT this month?

As we welcome the warmer weather, things are heating up at Rivercity Technology! We’re thrilled to be onboarding new clients and tackling exciting projects that keep our team busy and engaged. From innovative tech solutions to creative problem-solving, our employees are embracing the momentum and bringing their A-game. It’s shaping up to be a fantastic season of growth and success!

Business gadget of the month

Temperature control heated coffee mug

Many people in business will tell you that their morning coffee is almost as important as a secure and well-maintained IT infrastructure… almost.

So, if your caffeine intake is responsible for keeping the wheels of your business moving, you’ll want a gadget to make sure nothing gets between you and that hot cup of motivation.

This heated rechargeable coffee mug is exactly what you need. It keeps your drink at the perfect custom temperature and even turns off automatically once it’s empty. You can thank us later.

$79.99 from Amazon.

Technology Update

New Outlook for Windows gets another useful feature

Microsoft Outlook for Windows now lets you open and save email attachments even when you’re offline.

This handy update means you can manage your files without needing an internet connection, making it even easier to stay productive wherever you are.

Tech facts

  • Researchers have developed miniature, Lego-like 3D-printed bone bricks that can heal broken bones. These tiny blocks, about the size of a flea, help bone regrowth and can be interlocked, just like the toy bricks.
  • The version of Super Mario Bros. 2 that we know in the West is a rebranded version of a Japanese game called “Yume Kōjō: Doki Doki Panic,” modified to suit Western audiences.In the early 2000s, tech enthusiasts
  • In the early 2000s, tech enthusiasts could boost AMD processors’ speeds (called overclocking) with a pencil. Drawing over tiny circuits on the chip with graphite reconnected them, unlocking faster performance. It was a clever hack, but risky – one mistake could damage the processor or void its warranty.

Inspirational quote of the month

“The world is changing very fast. Big will not beat small anymore. It will be the fast beating the slow.”

Rupert Murdoch, media proprietor.

A New Month, A New Tech Quiz

1) What was the name of the first interactive computer graphics program?

2) What do you call a private network designed to allow communication within a business?

3) What are “computer trojans”?

4) What does the acronym FTP stand for?

5) How many bits are in one byte?

The answers are below.

  1. Sketchpad
  2. Intranet
  3. They’re malicious programs disguised as harmless files to trick you into installing them
  4. File Transfer Protocol
  5. 8

New to Microsoft 365

Large events can run more smoothly in Teams A new feature has arrived on Microsoft Teams that enhances large events using the Town Hall and webinar capabilities. This makes them even easier to use. Organizers can now assign presenters as Q&A moderators.

Moderators can handle questions during the event, choosing which ones to publish and making the Q&A flow more smoothly. Plus, organizers can tweak the list of moderators anytime - even in the middle of the event

For any help or advice, get in touch. It’s what we do.

Rivercity Tech
Article Written by Rivercity Tech

Get in Touch

Need IT Services or Cybersecurity for your business? Have tech questons? Contact us today, we'd love to help you!
Blog Sidebar Contact Form
Related Articles
Featured image
The Monthly Download—February 2025
Here’s why you should stick to work-specific tools When it comes to communicating with your team, it can be tempting to stick with what’s familiar. Apps lik...
Featured image
The Monthly Download—January 2025
Are your tech tools helping or hurting your business? In the rush to stay competitive, businesses have been trying out new tech tools left, right, and center. I...
Featured image
The Monthly Download—December 2024
The number one threat to your business? Ransomware Imagine this: You’re starting a normal day, coffee in hand, ready to tackle your to-do list. Suddenly, a re...
Rivercity Technology Services LTD logo
We are your IT department. How would you like to manage your risk?
201-116 Research Dr,
Saskatoon, SK
S7N 3R3

306-933-3355

Copyright © 2025 - All Rights Reserved

crossmenu