Rivercity Technology Services LTD Logo
About Us
Icon showing a support technician
IT Support Services
Cybersecurity Risk Management at one predictable flat rate.
Icon of light bulbs on a laptop screen
IT Consulting
Business optimization through the smart use of technology.
Icon showing a hand holding a phone
Business Phone Services
VoIP Telephone solutions from RCT. 
Icon showing a database and a cloud
Backups & Recovery
Cloud & On Premise - ready to recover!
Icon showing website wireframes
Website Development & Hosting
Web design and full hosting & maintenance packages!
Icon showing an envelope being opened
Modern Email Management
Microsoft 365 email provisioning, security & management.
Icon of a magnifying glass inspecting binary code on a computer screen
Cybersecurity Risk Assessment
Internal auditing to help identify potential cyber threats.
“You’re giving me the ‘it’s not you, it’s me’ routine? I invented ‘it’s not you, it’s me.’ Nobody tells me it’s them not me; if it’s anybody, it’s me.”
- George Costanza
Learning CenterNewsletterContact Us
Book A Consultation

The Monthly Download—December 2023

Should your business follow Google’s security lead?

Google has introduced a new security strategy – but is it right for your business?

It has put some employees on a cyber diet, restricting their internet access to limit potential threats.

On the surface, it sounds like a smart move. Google's approach is like building a taller fence around your house to keep out burglars.

By reducing internet connectivity, they're effectively shrinking their digital footprint and making it harder for cyber criminals to find a way in.

But is it foolproof?

Well, not exactly.

While this strategy does limit external threats, it doesn't entirely eliminate the risk.

Think of it this way: you've built a towering wall around your house, but your teenager leaves the back gate open. Similarly, internal systems might remain connected to other devices that can access the internet, providing a potential entry point for cyber threats.

In other words, you can't just focus on keeping things out.

Yes, there are very real threats from external hackers using all sorts of techniques like phishing, zero-day attacks, and malware. But the security industry often overlooks significant threats from within the perimeter.

Research shows that insider threats account for 62% of all security breaches. These insiders – disgruntled employees, careless staff, or malicious actors – often have legitimate access rights and intimate knowledge of the system and can bypass traditional security checks. It's like having a burglar who knows where you hide your spare key.

So, what's the takeaway?

While Google's strategy has its merits, it's not a one-size-fits-all solution. Just as you wouldn't wear shoes that are too big, your business needs a cyber security strategy tailored to fit its unique requirements. A robust cyber security strategy should focus on both external and internal threats and have measures in place to mitigate risks from all angles.

Our advice? Instead of simply following in Google's footsteps, consider your own business's needs and vulnerabilities. And, of course, get in touch if you need help with that!

What's happening at RCT this month?

The RCT office is feeling a lot like Santa's workshop this month! Our incredible team is hustling with clients and ensuring they are set with all their IT needs for the upcoming holiday season! We are loving the energy and holiday spirit.

Business gadget of the month

Logitech Wireless Ergonomic keyboard: When you spend hours at your computer, it’s not just your eyes that get tired. Your hands, wrists and shoulders can begin to ache, and you may even develop issues like repetitive strain injury.

This Logitech Wireless Ergonomic keyboard is the answer you’ve been looking for. It lets your hands move in a more natural way, reducing stress and increasing comfort.

$213.98 from Amazon.

Technology Update

It’s now easier to grab video stills from YouTube.

If you use Chrome, Edge, or a similar browser called Arc, a new tool will help you grab high-quality stills from videos.

Why might you need this? To highlight key points from presentations and training videos, or even for making note-taking simpler

Just right-click on the paused video and select “Copy video frame”.

Tech facts

  • In 2021, an Apple II computer manual signed by Steve Jobs sold for almost $800,000 at auction.
  • File hosting service Dropbox was founded by MIT students Drew Houston and Arash Ferdowsi in 2007. It’s now thought to be worth over $9 billion.
  • The name Wi-Fi was coined by brand-consulting firm Interbrand when asked to come up with a name that was “a little catchier than ‘IEEE 802.11b Direct Sequence’.” The term Wi-Fi was ultimately chosen as a pun on hi-fi.

Inspirational quote of the month

“You don’t need to have a 100–person
company to develop that idea.”

—Larry Page, co-founder of Google

A New Month, A New Tech Quiz

1) Often pronounced “gooey”, GUI is short for what well-known three-word tech term?

2) What does CAPTCHA stand for?

3) What popular operating system, launched in 1991, also has its own mascot, Tux the penguin?

4) Which movie was not just the final Pixar movie to be released on VHS but also the first to be released on Blu-ray?

5) Which famous tech giant had the company motto “THINK” for over 40 years?

The answers are below.

  1. Graphical User Interface
  2. Completely Automatic Public Turing Test to Tell Computers and Humans Apart.
  3. Linux.
  4. Cars.
  5. IBM.

New to Microsoft 365

Outlook could soon be writing your emails for you.

Thanks to Copilot (Microsoft’s AI companion), you’ll be able to draft more concise, professional emails in Outlook, with suggested edits for clarity and inclusive language.

And if there’s a long email thread you need to respond to, Copilot can even summarize it and draft suggested replies.

For any help or advice, get in touch. It’s what we do.

Rivercity Tech
Article Written by Rivercity Tech

Get in Touch

Need IT Services or Cybersecurity for your business? Have tech questons? Contact us today, we'd love to help you!
Blog Sidebar Contact Form
Related Articles
Featured image
The Monthly Download—June 2024
Passwords. They’re the keys to our digital kingdoms, but also the biggest pain in our necks. They’ve been around since the dawn of the internet, and guess w...
Featured image
The Monthly Download—May 2024
Passwords. They’re the keys to our digital kingdoms, but also the biggest pain in our necks. They’ve been around since the dawn of the internet, and guess w...
Featured image
The Monthly Download—April 2024
Here’s the deal: Even if you invest in cyber security training, changing long held password habits can be a tough nut to crack. People love convenience, and r...
Rivercity Technology Services LTD logo
We are your IT department. How would you like to manage your risk?
201-116 Research Dr,
Saskatoon, SK
S7N 3R3


Copyright © 2024 - All Rights Reserved