514 895-5858
  • Support
  • Blog
  • Contact us
  • Careers
  • Blog
  • fr
  • Our
    company
  • Our added
    value
  • IT services
    support
  • Security and
    protection
  • Cybersecurity
    • Phishing simulation
    • Dark Web Monitoring
    • Formation
  • Business
    solutions
    • Formations
      • Microsoft 365 Training Program (In construction)
      • Cybersecurity
    • Teleworking solutions for businesses
    • Network audit and design
    • Infrastructure
    • Daily maintenance
    • Mobile device management
    • Cloud
  • Request a
    consultation
Select Page
Jaguar Land Rover at a standstill: a textbook case of industrial digital resilience

Jaguar Land Rover at a standstill: a textbook case of industrial digital resilience

Oct 3, 2025 | News, Security

Read more
Is your IT team overworked? Outsource your cybersecurity!

Is your IT team overworked? Outsource your cybersecurity!

Aug 11, 2025 | Security

Read more
A cyber-attack at their place, a crisis at yours

A cyber-attack at their place, a crisis at yours

Aug 7, 2025 | News, Security

Read more
Bill 25, Cyber Security Canada, NIST… which IT standards to apply and when?

Bill 25, Cyber Security Canada, NIST… which IT standards to apply and when?

Jul 30, 2025 | News, Security

Read more
Critical vulnerabilities: 748 printer models exposed

Critical vulnerabilities: 748 printer models exposed

Jul 21, 2025 | Security

Read more
IT updates: 4 simple steps to secure your tools

IT updates: 4 simple steps to secure your tools

Jul 15, 2025 | Lifehacks techno, Security

Read more
Transatlantic cybersecurity: Canada-EU strategic pact to be signed in 2025

Transatlantic cybersecurity: Canada-EU strategic pact to be signed in 2025

Jul 2, 2025 | News, Security

Read more
7 Simple Steps : Cybersecurity Quick Wins

7 Simple Steps : Cybersecurity Quick Wins

Jun 9, 2025 | Lifehacks techno, Security, Uncategorized

Read more
AI in business: a brilliant ally or a tool to be tamed?

AI in business: a brilliant ally or a tool to be tamed?

May 21, 2025 | News, Security

Read more
<123...>Last »

Search

Recent Posts

  • Passwords in 2026: Why Are We Still Using a Method From Another Era?
  • Online Identity Theft: Quebec Introduces a Bill
  • Security Blind Spots: Why Even Well-Protected SMBs Remain Vulnerable
  • Claude : When an AI Becomes Too Powerful to Be Released
  • Under 24 Hours: How Cyberattacks Now Hit SMBs Without Warning

Categories

  • Alerts
  • Lifehacks techno
  • News
  • Security
  • Uncategorized

Archives

  • 2026 (12)
    • May (1)
    • April (3)
    • March (3)
    • February (2)
    • January (3)
  • 2025 (61)
  • 2024 (14)
  • 2023 (10)
  • 2022 (5)
  • 2021 (3)
  • 2020 (5)
  • 2019 (14)
  • 2018 (9)
  • 2017 (2)


logo-my-technician

Privacy Policy
Cookies Policy

Head office
Laval
4422 Louis-B.-Mayer
Laval (Quebec) H7P 0G1

On appointment
Montreal

1210 Jeanne-Mance Street
Montreal, (Quebec) H2X 0C4

Blainville
650 Bd Industriel #101
Blainville (Quebec) J7C 5Y7

Repentigny
635 Iberville Blvd.,
Repentigny, (Quebec) J6A 2C5

Phone: 514-895-5858
Fax: 450-934-4393
[email protected]

© 2026 My Technician | All rights reserved.

We ensure complete transparency about how we use your data.

This is why we inform you that we use navigation cookies and other technologies to ensure the proper functioning and security of our website. Other cookies and technologies help facilitate, improve and personalize your online experience. You can manage your preferences for cookies and other technologies by clicking “Customise”.

Functional Always active
The storage or technical access is strictly necessary for the purpose of legitimate interest of allowing the use of a specific service explicitly requested by the subscriber or Internet user, or for the sole purpose of carrying out the transmission of communication on an electronic communications network.
Preferences
L’accès ou le stockage technique est nécessaire dans la finalité d’intérêt légitime de stocker des préférences qui ne sont pas demandées par l’abonné ou l’internaute.
Statistics
Technical storage or access that is used exclusively for statistical purposes. Storage or technical access that is used exclusively for anonymous statistical purposes. Absent a subpoena, voluntary compliance by your Internet Service Provider, or additional records from a third party, information stored or retrieved for this sole purpose cannot generally not be used to identify you.
Marketing
Storage or technical access is necessary to create Internet user profiles in order to send advertisements, or to track the Internet user on a website or on several websites with similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Customize
  • {title}
  • {title}
  • {title}


ON YOUR PC
Click the icon My Technician in your taskbar.



BY EMAIL
[email protected]



BY PHONE
514-895-5858, option 1

Remote support


ON YOUR PC
Click the icon My Technician in your taskbar.



BY EMAIL
[email protected]



BY PHONE
514-895-5858, option 1

Remote support