514 895-5858
  • Support
  • Blog
  • Contact us
  • Careers
  • Blog
  • fr
  • Our
    company
  • Our added
    value
  • IT services
    support
  • Security and
    protection
  • Cybersecurity
    • Phishing simulation
    • Dark Web Monitoring
    • Formation
  • Business
    solutions
    • Formations
      • Microsoft 365 Training Program (In construction)
      • Cybersecurity
    • Teleworking solutions for businesses
    • Network audit and design
    • Infrastructure
    • Daily maintenance
    • Mobile device management
    • Cloud
  • Request a
    consultation
Select Page
Phishing (Fishing): How to recognize and avoid the most common attacks?

Phishing (Fishing): How to recognize and avoid the most common attacks?

Nov 13, 2024 | Lifehacks techno, Security

Read more
What is a Pentest and What is it For?

What is a Pentest and What is it For?

Jul 25, 2024 | Lifehacks techno, Security

Read more
Breachcoach : your partner in databreach management

Breachcoach : your partner in databreach management

Aug 14, 2023 | Lifehacks techno

Read more
The advantages and disadvantages of using monitoring software such as ActivTrak, Hubstaff, and Teramind.

The advantages and disadvantages of using monitoring software such as ActivTrak, Hubstaff, and Teramind.

Aug 3, 2023 | Lifehacks techno

Read more
What are SOC, SIEM and EDR and how do they work together?

What are SOC, SIEM and EDR and how do they work together?

Mar 20, 2023 | Lifehacks techno, Security

Read more
5 Tips on How to Be a Better E-Employer Long Term

5 Tips on How to Be a Better E-Employer Long Term

Apr 22, 2021 | Lifehacks techno

Read more
What if all your emails disappeared?

What if all your emails disappeared?

Mar 2, 2021 | Lifehacks techno, Security

Read more
Make Telecommuting Easier and more Secure During COVID-19

Make Telecommuting Easier and more Secure During COVID-19

Mar 19, 2020 | Lifehacks techno, News

Read more
A Look Back at Cyber Attacks in 2019 and their Consequences

A Look Back at Cyber Attacks in 2019 and their Consequences

Mar 18, 2020 | Lifehacks techno

Read more
« First<...345>

Search

Recent Posts

  • Online Identity Theft: Quebec Introduces a Bill
  • Security Blind Spots: Why Even Well-Protected SMBs Remain Vulnerable
  • Claude : When an AI Becomes Too Powerful to Be Released
  • Under 24 Hours: How Cyberattacks Now Hit SMBs Without Warning
  • “External Email” Banners: A Good Idea… That Employees No Longer Notice

Categories

  • Alerts
  • Lifehacks techno
  • News
  • Security
  • Uncategorized

Archives

  • 2026 (11)
    • April (3)
    • March (3)
    • February (2)
    • January (3)
  • 2025 (61)
  • 2024 (14)
  • 2023 (10)
  • 2022 (5)
  • 2021 (3)
  • 2020 (5)
  • 2019 (14)
  • 2018 (9)
  • 2017 (2)


logo-my-technician

Privacy Policy
Cookies Policy

Head office
Laval
4422 Louis-B.-Mayer
Laval (Quebec) H7P 0G1

On appointment
Montreal

1210 Jeanne-Mance Street
Montreal, (Quebec) H2X 0C4

Blainville
650 Bd Industriel #101
Blainville (Quebec) J7C 5Y7

Repentigny
635 Iberville Blvd.,
Repentigny, (Quebec) J6A 2C5

Phone: 514-895-5858
Fax: 450-934-4393
[email protected]

© 2026 My Technician | All rights reserved.

We ensure complete transparency about how we use your data.

This is why we inform you that we use navigation cookies and other technologies to ensure the proper functioning and security of our website. Other cookies and technologies help facilitate, improve and personalize your online experience. You can manage your preferences for cookies and other technologies by clicking “Customise”.

Functional Always active
The storage or technical access is strictly necessary for the purpose of legitimate interest of allowing the use of a specific service explicitly requested by the subscriber or Internet user, or for the sole purpose of carrying out the transmission of communication on an electronic communications network.
Preferences
L’accès ou le stockage technique est nécessaire dans la finalité d’intérêt légitime de stocker des préférences qui ne sont pas demandées par l’abonné ou l’internaute.
Statistics
Technical storage or access that is used exclusively for statistical purposes. Storage or technical access that is used exclusively for anonymous statistical purposes. Absent a subpoena, voluntary compliance by your Internet Service Provider, or additional records from a third party, information stored or retrieved for this sole purpose cannot generally not be used to identify you.
Marketing
Storage or technical access is necessary to create Internet user profiles in order to send advertisements, or to track the Internet user on a website or on several websites with similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Customize
  • {title}
  • {title}
  • {title}


ON YOUR PC
Click the icon My Technician in your taskbar.



BY EMAIL
[email protected]



BY PHONE
514-895-5858, option 1

Remote support


ON YOUR PC
Click the icon My Technician in your taskbar.



BY EMAIL
[email protected]



BY PHONE
514-895-5858, option 1

Remote support