Our Resources
Microsoft 365
How can M365 tools help with data protection?
Microsoft 365 (M365) offers many security tools and features that help protect user data. Since the implementation of Law 25 in Quebec on the protection of personal information of users,…
It’s the end of SharePoint 2013, what to do?
On April 11, 2023, Microsoft will stop supporting SharePoint 2013 and providing security patches for this solution. There is no rush to prepare for your migration, but you still need…
How M365 tools can help with data protection
Microsoft 365 (M365) offers many security tools and features that help protect user data. Since the implementation of Law 25 in Quebec on the protection of personal information of users,…
The 5 IT articles most popular of 2022
At MS Solutions, our priority is to offer you relevant content on the IT universe to keep you informed of new developments. For this reason, we have concocted a top…
How to use the new version of Stream
Corporate videos, tutorials, presentations… there are plenty of opportunities when it comes to integrating video into a corporate context. Let’s see together how to use the new version of Stream…
Let’s demystify Microsoft licenses: the possibilities are endless!
The possibilities are endless when it comes to Microsoft licenses and it is often complex to make the right choice for our organization. Productivity tools, security tools or additional tools,…
Advanced SharePoint training: for whom, for what
If you’ve adopted Microsoft 365, you should have one or more SharePoint superuser(s). These people generally hold all the keys to optimizing the productivity of your teams and collaboration within…
End of basic authentification at Microsoft : the impacts
Starting October 1st, 2022, Microsoft is moving into a new era of security: It’s the end of Basic Authentication. The simple login by username and password will be removed, and…
Cybersecurity
What are good data backup practices?
Data backup is crucial for any organization, regardless of size or industry. Data is often the basis of all business activity, and the loss of this data can have catastrophic…
What are the different types of phishing
A phishing scam involves tricking the recipient into responding to a request, whether it’s to click on a link, install an attachment, or transfer money. Phishing messages are sent from…
Avoid the risks of phishing
Phishing is a technique used by hackers to try to trick users into clicking on dangerous links or asking them to share sensitive information. Phishing attacks can take many forms,…
Three simple and effective strategies for your cybersecurity
Nearly 45% of Canadian SMEs were the target of a cyberattack in 2022 (Source: Journal de Montréal). In addition to being costly, cyberattacks can damage your company’s reputation. Fortunately, there are…
Business IT Hot Topics for 2023
You are a Quebec organization and you come across this article in 2023? Fortunate ! You are exactly where you should be. We will talk about hot topics in IT…
How M365 tools can help with data protection
Microsoft 365 (M365) offers many security tools and features that help protect user data. Since the implementation of Law 25 in Quebec on the protection of personal information of users,…
How a Penetration Test Works
A cybersecurity penetration test, also known as a penetration test or “pentest”, is a process used to assess the security of a computer system, network or web application by simulating…
Risk analysis, essential for your cybersecurity
All companies that have been victims of a cyberattack will confirm that when it comes to computer security, it is better to favor prevention than remediation. To do so, risk…
IT News
What are good data backup practices?
Data backup is crucial for any organization, regardless of size or industry. Data is often the basis of all business activity, and the loss of this data can have catastrophic…
How can M365 tools help with data protection?
Microsoft 365 (M365) offers many security tools and features that help protect user data. Since the implementation of Law 25 in Quebec on the protection of personal information of users,…
Avoid the risks of phishing
Phishing is a technique used by hackers to try to trick users into clicking on dangerous links or asking them to share sensitive information. Phishing attacks can take many forms,…
What are the different types of phishing
A phishing scam involves tricking the recipient into responding to a request, whether it’s to click on a link, install an attachment, or transfer money. Phishing messages are sent from…
It’s the end of SharePoint 2013, what to do?
On April 11, 2023, Microsoft will stop supporting SharePoint 2013 and providing security patches for this solution. There is no rush to prepare for your migration, but you still need…
Avoid the risks of phishing
Phishing is a technique used by hackers to try to trick users into clicking on dangerous links or asking them to share sensitive information. Phishing attacks can take many forms,…
Three simple and effective strategies for your cybersecurity
Nearly 45% of Canadian SMEs were the target of a cyberattack in 2022 (Source: Journal de Montréal). In addition to being costly, cyberattacks can damage your company’s reputation. Fortunately, there are…
Business IT Hot Topics for 2023
You are a Quebec organization and you come across this article in 2023? Fortunate ! You are exactly where you should be. We will talk about hot topics in IT…
How M365 tools can help with data protection
Microsoft 365 (M365) offers many security tools and features that help protect user data. Since the implementation of Law 25 in Quebec on the protection of personal information of users,…
How a Penetration Test Works
A cybersecurity penetration test, also known as a penetration test or “pentest”, is a process used to assess the security of a computer system, network or web application by simulating…
The 5 IT articles most popular of 2022
At MS Solutions, our priority is to offer you relevant content on the IT universe to keep you informed of new developments. For this reason, we have concocted a top…
How to use the new version of Stream
Corporate videos, tutorials, presentations… there are plenty of opportunities when it comes to integrating video into a corporate context. Let’s see together how to use the new version of Stream…
Let’s demystify Microsoft licenses: the possibilities are endless!
The possibilities are endless when it comes to Microsoft licenses and it is often complex to make the right choice for our organization. Productivity tools, security tools or additional tools,…
Advanced SharePoint training: for whom, for what
If you’ve adopted Microsoft 365, you should have one or more SharePoint superuser(s). These people generally hold all the keys to optimizing the productivity of your teams and collaboration within…
Telecommuting or hybrid: don’t leave your cybersecurity to chance
Since teleworking and hybrid mode have become part of everyday life, ensuring the company’s cybersecurity is increasingly complex. The “office” is no longer limited to the company headquarters… Living room,…
Bill 25 and cybersecurity: are you ready?
If your organization stores sensitive personal data such as credit card numbers, social insurance numbers, or other confidential information about your customers or partners, you are covered by Bill 25. Indeed,…
End of basic authentification at Microsoft : the impacts
Starting October 1st, 2022, Microsoft is moving into a new era of security: It’s the end of Basic Authentication. The simple login by username and password will be removed, and…
What are the basics of “Bring your own device”
“Bring your own device” (BYOD) is a concept that consists to use personal equipment in a professional context. Through this article we will see the advantages of this practice, but…
Frequently asked questions about M365
Through this article we have compiled the most common questions about Microsoft 365 asked during our training.Thus, we will answer various questions related to functionality, security, but also which application…
What is a “breach coach”
In 2022, the possibilities for breaches are endless and can occur through multiple devices, through external networks… When it comes to cybersecurity, the most complex and crucial phase for your…
Documents to download
The hot IT topics in the business world in 2023
Fill the form to download the document
Succeed in your Microsoft 365 journey
Fill the form to download the document
8 criteria for choosing a cloud provider
Fill the form to download the document
8 Major IT Trends of 2022
Download the document by filling in the form