Our Resources
IT News
Microsoft Intune: secure, centralized device management
In a world of constant technological change, where working patterns are shifting towards hybrid configurations, including teleworking, and where equipment is evolving rapidly, thanks in particular to the “bring your…
Vigilance: are you getting the most out of the platform?
Considering that 82% of security breaches in an organization are the result of human error (Verizon, 2023), and that 1 in 5 email attacks is successful (Tessian, 2022), it’s safe…
5 steps to block spam on Outlook
Unwanted e-mails, also known as spam, can be a major nuisance in your inbox. On an organization-wide scale, they can not only reduce your productivity, but also have an impact…
F.A.Q about Microsoft 365 Copilot
Microsoft 365 Copilot piqued the curiosity of our listeners during a recent webinar given by our team. In order to provide you with as much information as possible on the…
Microsoft 365 Copilot: the artificial intelligence that will revolutionize your everyday life
Artificial intelligence (AI) continues to revolutionize the way we work and interact with technology. Among the latest advances in this field, Microsoft 365 Copilot stands out as a revolutionary AI…
Microsoft Build 2023: A Look at Microsoft’s Breakthrough AI Innovations
Microsoft’s Build 2023 conference was a major event for tech enthusiasts and developers around the world. With powerful announcements and significant advances in the field of artificial intelligence (AI), Microsoft…
MS Solutions announces the acquisition of ARS Solutions
Quebec, May 2, 2023 – It is with pride that MS Solutions, a leader in digital transformation in Quebec, announces the acquisition of ARS Solutions, an SME offering technology and cybersecurity…
Power Platform: the low-code solution to improve your productivity
In an increasingly competitive world, it is crucial for organizations to seek ways to improve productivity, accelerate innovation, while reducing costs. “Doing more with less” is Microsoft’s promise about the…
Penetration Testing or Cybersecurity Audit: Which is Right for Whom?
IT security is a major concern for all organizations, big or small. Cyberattacks are becoming more frequent and sophisticated, and the consequences can be disastrous. In this context, it is…
What are good data backup practices?
Data backup is crucial for any organization, regardless of size or industry. Data is often the basis of all business activity, and the loss of this data can have catastrophic…
How to create a content-rich intranet with SharePoint?
A content-rich intranet is an internal company website that is designed to provide a wealth of useful information and resources to employees. It can include company news and announcements, guides…
Avoid the risks of phishing
Phishing is a technique used by hackers to try to trick users into clicking on dangerous links or asking them to share sensitive information. Phishing attacks can take many forms,…
What are the different types of phishing
A phishing scam involves tricking the recipient into responding to a request, whether it’s to click on a link, install an attachment, or transfer money. Phishing messages are sent from…
It’s the end of SharePoint 2013, what to do?
On April 11, 2023, Microsoft will stop supporting SharePoint 2013 and providing security patches for this solution. There is no rush to prepare for your migration, but you still need…
Avoid the risks of phishing
Phishing is a technique used by hackers to try to trick users into clicking on dangerous links or asking them to share sensitive information. Phishing attacks can take many forms,…
Three simple and effective strategies for your cybersecurity
Nearly 45% of Canadian SMEs were the target of a cyberattack in 2022 (Source: Journal de Montréal). In addition to being costly, cyberattacks can damage your company’s reputation. Fortunately, there are…
Business IT Hot Topics for 2023
You are a Quebec organization and you come across this article in 2023? Fortunate ! You are exactly where you should be. We will talk about hot topics in IT…
How M365 tools can help with data protection
Microsoft 365 (M365) offers many security tools and features that help protect user data. Since the implementation of Law 25 in Quebec on the protection of personal information of users,…
The 5 IT articles most popular of 2022
At MS Solutions, our priority is to offer you relevant content on the IT universe to keep you informed of new developments. For this reason, we have concocted a top…
The main step of Bill 25 about the protection of personal information
Bill 25 modernizes Quebec’s privacy legislation. Its aim is to give users greater control over their personal information. To comply with the requirements of this law, organizations will have to…
Microsoft 365
Microsoft Intune: secure, centralized device management
In a world of constant technological change, where working patterns are shifting towards hybrid configurations, including teleworking, and where equipment is evolving rapidly, thanks in particular to the “bring your…
5 steps to block spam on Outlook
Unwanted e-mails, also known as spam, can be a major nuisance in your inbox. On an organization-wide scale, they can not only reduce your productivity, but also have an impact…
F.A.Q about Microsoft 365 Copilot
Microsoft 365 Copilot piqued the curiosity of our listeners during a recent webinar given by our team. In order to provide you with as much information as possible on the…
Microsoft 365 Copilot: the artificial intelligence that will revolutionize your everyday life
Artificial intelligence (AI) continues to revolutionize the way we work and interact with technology. Among the latest advances in this field, Microsoft 365 Copilot stands out as a revolutionary AI…
Microsoft Build 2023: A Look at Microsoft’s Breakthrough AI Innovations
Microsoft’s Build 2023 conference was a major event for tech enthusiasts and developers around the world. With powerful announcements and significant advances in the field of artificial intelligence (AI), Microsoft…
Power Platform: the low-code solution to improve your productivity
In an increasingly competitive world, it is crucial for organizations to seek ways to improve productivity, accelerate innovation, while reducing costs. “Doing more with less” is Microsoft’s promise about the…
How to create a content-rich intranet with SharePoint?
A content-rich intranet is an internal company website that is designed to provide a wealth of useful information and resources to employees. It can include company news and announcements, guides…
It’s the end of SharePoint 2013, what to do?
On April 11, 2023, Microsoft will stop supporting SharePoint 2013 and providing security patches for this solution. There is no rush to prepare for your migration, but you still need…
Cybersecurity
Microsoft Intune: secure, centralized device management
In a world of constant technological change, where working patterns are shifting towards hybrid configurations, including teleworking, and where equipment is evolving rapidly, thanks in particular to the “bring your…
Vigilance: are you getting the most out of the platform?
Considering that 82% of security breaches in an organization are the result of human error (Verizon, 2023), and that 1 in 5 email attacks is successful (Tessian, 2022), it’s safe…
5 steps to block spam on Outlook
Unwanted e-mails, also known as spam, can be a major nuisance in your inbox. On an organization-wide scale, they can not only reduce your productivity, but also have an impact…
Penetration Testing or Cybersecurity Audit: Which is Right for Whom?
IT security is a major concern for all organizations, big or small. Cyberattacks are becoming more frequent and sophisticated, and the consequences can be disastrous. In this context, it is…
What are good data backup practices?
Data backup is crucial for any organization, regardless of size or industry. Data is often the basis of all business activity, and the loss of this data can have catastrophic…
What are the different types of phishing
A phishing scam involves tricking the recipient into responding to a request, whether it’s to click on a link, install an attachment, or transfer money. Phishing messages are sent from…
Avoid the risks of phishing
Phishing is a technique used by hackers to try to trick users into clicking on dangerous links or asking them to share sensitive information. Phishing attacks can take many forms,…
Three simple and effective strategies for your cybersecurity
Nearly 45% of Canadian SMEs were the target of a cyberattack in 2022 (Source: Journal de Montréal). In addition to being costly, cyberattacks can damage your company’s reputation. Fortunately, there are…
Documents to download
10 Essential Elements of Hybrid-Mode IT Strategy
Fill the form to download the document
Cybersecurity in 2023: Ideal cybersecurity path and required budget
Fill the form to download the document
The hot IT topics in the business world in 2023
Fill the form to download the document
Succeed in your Microsoft 365 journey
Fill the form to download the document
8 criteria for choosing a cloud provider
Fill the form to download the document