CBMIT
Our managed IT and support services deliver cohesive, top-to-bottom solutions that simplify your operations.
DOWNTOWN DINING WEEK!
Our first favorites are coming to you from the owners here at CBM IT. and -yeg. Looking for somewhere to grab lunch or dinner this week maybe you will consider one of these CBM Team Favorites!!
Cheers!
At CBM IT we value supporting local. We have asked our team members to choose their favorite down town restaurant to share with our followers and help to encourage more of you to support local.
Check out: www.edmontondowntown.com for events and specials from participating restaurants!
Follow us this week to find out some of our favorites!
Spear Phishing is a very common form of cyber attacks that are hitting local businesses now a regular basis. Is your team prepared to properly identify a phishing campaign?
Why not run a test to identify any weak points within your company and help to train your team.
We offer campaigns to do just that!
Feel free to reach out and we would be happy to discuss what we can offer for your company.
Two Factor Authentication is a form of Cyber Security. It is something that you are hearing more about on a regular basis. Many websites are updating and requiring this extra security measure.
If you are not currently requiring it at your company, please do not hesitate to get in touch to learn all about it and how we can help implement this process for you.
Transparency is all about communication. When we have clear and open communication to and from our customers we are able to provide the best solutions possible.
In order to be a top MSP provider we believe Transparency is one of the highest values CBM IT can hold.
We are always thankful for our customers taking the time to share a review. If you are happy with a company please know how much it is appreciated when you take the time out of your day to share that feedback publicly.
I challenge everyone to take some time out of your day and review some of your favorite businesses. I promise it doesn't go unnoticed.
Thank you to each and every one of our current and future clients 😁
About this opportunity
We are looking for a technician who is fluent in Spanish to be stationed at one of our client sites. We are looking for an individual with Drive, Determination, and that hunger for growth. This role requires the chosen individual to have strong soft skills along with the ability to effectively lead and mentor the junior techs. We are a very team and family focused Company who strive to provide each one of our staff a reasonable work life balance. We want each one of our team members to be successful in both work and life. If you feel you can be an effective part of the CBMIT team, please read on…
Responsibilities
Provide exceptional front-line support to clients
Dealing with Mexico plant IT operations.
Interact with clients remotely and on site.
Work with customers to manage expectations, keep them informed and strive for customer satisfaction.
Provide complete support for client environments including hardware, operating systems, software.
Work with vendor support on behalf of our clients to ensure their support issues are resolved.
Complete and close all project tasks where capable. Seek help for tasks that are above skill level.
Update and contribute content to our internal knowledge base.
Maintain a calm and professional attitude even when dealing with stressful situations.
Perform general system support functions and other cross-functional duties, as assigned.
Support team goals to manage inventory ensure required resources are available.
Attend and contribute to team meetings as needed.
Earn the trust and respect of clients.
Support the team by taking on afterhours calls
Skills and Qualifications
being Fluent in Spanish is a requirement for this position
Experience with Microsoft Azure & Office 365
Education: Diploma or Degree are preferred, but relevant work experience can be a substitute
Take a role in incident management and collaborate with the teams, both internal and external, to resolve client outages.
Provided day to day mentorship for Support Technicians.
At least 5 years of experience as a System Administration or It Technician
Preference will be given to candidates who have previous been employed at a Managed Services Provider
Advanced level knowledge and experience with server support and networking
Analytical and Problem-Solving skills
Perform data backups and disaster recovery operations.
Strong and effective oral and written communicator
Strong time management skills, multitasking skills, and the ability to prioritize tasks with minimal supervision.
Detail oriented personality
Driven to always learn how to implement and support the cutting edge of technology.
Professional, responsive, and positive work attitude is essential.
Job Types: Full-time, Permanent
Salary: $38,072.00-$50,000.00 per year
Customer service is not just a department, it is our entire company here at CBM IT. We value our customers and in order to have long term relationships we must truly be invested.
CBM prides ourselves on the quality of our team and their vast knowledge in IT.
IT has a wide scope of specialties and we work to create a team that compliment each others skill sets. This variety of expertise allows for us to provide our customers with the Knowledge needed for a multitude of technological issues or advancements.
When you call in or submit a ticket you can be confident that our team members will collectively have the knowledge to assist.
Our approach at CBM IT is to ensure each individual business is being serviced based on their specific needs. Each clients IT needs are reviewed and evaluated to ensure we together develop a strategic and clear plan. Our assistance is here to help streamline your business operations.
SUPPORT LOCAL. REFER A FRIEND.
We want to make an impact. For customers who refer friends to CBM-IT,
we're offering rewards that support other Edmonton businesses.
HOW IT WORKS
Step 1
Use this form to introduce us to someone who needs IT services.
Step 2
Choose your local business reward when your referral contact becomes a CBM-IT customer.
Step 3
We set up our new customer with IT services.
To learn more OR start referring today please visit our website.
https://cbmit.ca/refer-a-business/
RESPONSIVE
One of our 6 Core Values we operate by here at CBM IT. When it comes to IT we understand how crucial it is to have everything running smoothly. Lengthy down time is not something any business should endure. We have an experienced team available to support you in a timely manner and efficient manner. This is a top priority!
TOM SVEDERUS
Many of our current customers, you will know Tom. Tom has been with CBM IT for quite some time and is our Level 3 Sr. System Admin. Tom works on the majority of our larger projects and higher level in troubleshooting.
He has 20 years experience in the industry. His education: MCSA, MCS, MCP, CompTIA A+, VMWare Training and Network Security Support Analyst.
Here at CBM we stand by a set of Core Values, one being Authenticity.
We believe that positive client relationships are built on being genuinely who we are. We vow to stay true to our values and seek to work with businesses who share them.
MANJOT KAUR SINDHAR
Manjot is our IT Service Manager and very often the first voice you will hear when you call. Manjot is a integral part of our leadership team here at CBM IT and ensures the top priority is monitoring tickets and keeping our clients and team operating as smoothly as possible.
She has 7 years experience and a B.Tech in Computer Science & Engineering. Her other educational accomplishments are: CCA, CCP, CCA-N, Leadership Development (NAIT), Level 2 Datto Technical Specialist, Webroot Certified Partner and ITIL Certified.
What makes us CBM?
OUR VALUES
These are the values that guide our business, our product development, and our brand. As our company continues to evolve and grow,
these six values remain constant.
Stick with us the next few weeks to learn more about what each value means to us here at CBM💻
NAVEEN SHARMA
Naveen has 17 years experience in account management and is here to be the voice for our clients. His education background: Master in Business Administration, Bachelor in Computer Science, A+ Certification CompTIA, Sandler Sales Foundation, Higher National Diploma in Computing.
Looking to speak to someone to discuss your needs, Naveen would be happy to help. Do not hesitate to reach out by phone 780-989-8621 or email [email protected].
Internet of Things Security (IoT)
IoT security refers to the methods of protection used to secure internet-connected or network-based devices. The Internet of things is being observed to be the next tool for the technological revolution.
IoT security is techniques, strategies and tools used to protect smart devices from becoming compromised.
Contact us for further analysis and information on your IoT security needs.
BRENDA MUDRYK
Brenda our controller here at CBM IT. She has a Bachelor of Commerce from the U of A and 13 years of experience in the field. 10 of those years being Financial Analyst for Telus.
Cloud Security
Most of the organizations are now inclined towards utilizing artificial intelligence to improve their businesses, enhance customer experience, and for efficient operations. With the plethora of data available at each step of organizational set-up, it becomes difficult for organizations to store these data in physical form. Also, it is observed that often this data is unstructured and is derived from unknown sources, which can cause a potential threat to the organization’s network. Hence, Amazon Web Services, Microsoft Azure, and Google Cloud present their customers with a cloud computing platform, where the users can store, and monitor data, by implementing a security tool.
Reports suggest that on-premise environments are highly prone to cyber malware. By integrating the system with a cloud security platform, the users will be rendered with the secured data, thus mitigating the possibility of a cyber-attack.
Happy New Year from our whole team at CBM IT. We wish you a year full of health and prosperity!
We are back to regular work hours as of today and hope everyone had a wonderful Holiday season.
We are looking forward to building our client relationships throughout 2022 and look forward to the continued positive growth of CBM IT.
IT DIRECTOR
Experience: 18 years
- MSCE, MCP, MCSA, MSBS, COMPTIA, A+, N+, VMWare Training
- Management Development (U of A)
- Leadership Development (Dale Carnegie)
- Management Certificate (NAIT)
What is application security?
Application security is measures at the application level aimed to prevent data or code within the app from being stolen or hacked. It includes the security considerations that happen during application development and design, but it also involves systems and approaches to protect apps after they get deployed. It can include security measures of hardware, software and procedures to help limit vulnerabilities. Examples are routers and firewalls that define what is allowed.
In todays world it is important to have application security because many applications are available over a wide variety of networks and cloud based. This increases vulnerabilities to threats and system breaches.
Types of Application Security include:
- Authentication
- Authorization
- Encryption
- Logging
- Application security testing
For more information on application security and ensuring your company is up to date and data is protected, please reach out and we would be happy to discuss.
Merry Christmas from CBMIT.
GLEN MUDRYK - CEO
I have a diploma in Electronics Engineering from NAIT and began the purchase of CBM in 1988. With the help of many great people, and over 33 years, I have expanded the product offerings, services and divisions of CBM to include CBM IT. Our focus has consistently been on helping companies communicate regardless of the medium. 100% of my focus is now on CBM IT, our clients and our staff. My role as CEO involves business development, maintenance of our partnerships with clients and suppliers and strategy. I have been actively involved in the assembly of our best-in-class team and play a supporting role in the delivery of our services.
As companies embrace digital transformation our role is to ensure that technology and automation is streamlining work and creating balance in our lives. As a team we often talk about balance, family, values and what role CBM can play in ensuring that we achieve balance internally and help our clients with the same.
Happy Monday!
Over the course of the next 13 weeks we will be introducing our team members 1 by 1.
Here at CBM IT we believe having a qualified and positive team environment is what allows us to provide each of our clients with one of a kind service.
Give us a follow in order to watch our introductions with Meet our Team Mondays and get a feel for who we all are at CBM IT!
NETWORK SECURITY
In today’s hyper-connected world, network security presents a greater challenge as more business applications move to private and public clouds. Moreover, the applications themselves now tend to be virtualized and distributed across many locations, some of which are outside the physical control of IT security teams. With the number of attacks on companies climbing ever higher, protecting network traffic and infrastructure is critical.
What are the key tools of network security?
A multi-layered approach to network security implements controls at numerous points within a network to provide comprehensive access control and threat control.
- Firewall : A firewall establishes a barrier between the trusted and the untrusted areas of a network. Thus, a firewall performs access control and macro-segmentation based on IP subnets. The same firewall may also perform more granular segmentation, known as micro-segmentation.
- Load Balancer : A load balancer distributes load based on metrics. By implementing specific mitigation techniques, a load balancer can go beyond traditional load balancing to provide the capability to absorb certain attacks, such as a volumetric DDoS attack.
- IDS/IPS : The classic IDS/IPS is deployed behind a firewall and provides protocol analysis and signature matching on various parts of a data packet. Protocol analysis is a compliance check against the publicly declared specification of the protocol. Signature matching prevents known attacks such as an SQL injection.
Sandbox : A sandbox is similar to an IDS/IPS, except that it does not rely on signatures. A sandbox can emulate an end-system environment and determine if a malware object is trying, for example, to execute port scans.
- NTA/NDR : NTA/NDR looks directly at traffic (or traffic records such as NetFlow) and uses machine learning algorithms and statistical techniques to evaluate anomalies and determine if a threat is present. First, NTA/NDR tries to determine a baseline. With a baseline in place, it identifies anomalies such as traffic spikes or intermittent communication.
Contact CBMIT to assist in protecting your network.
What is Cyber Security?
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. I will cover these Categories in following post's .
- Network security
- Application security
- Information security
- Operational security
- Disaster recovery and business continuity
- End-user education
FIVE TYPES OF CYBER SECURITY FOR ORGANIZATIONAL SAFETY
Critical Infrastructure Cybersecurity
The critical infrastructure cybersecurity technique is deployed to secure the systems that have the critical infrastructure. They are systems on which the societies heavily rely on. These include- Electricity grid, Water Purification, Traffic lights, Shopping centers, and hospitals. They are not directly linked with a possible cyber infringement but can act as a platform through which the cyber malware can happen to the endpoints that these systems are connected to.
To mitigate the possibility of cyber malware or reduce cyber attacks, the organizations responsible for maintaining critical infrastructure must access the vulnerable points for protecting the businesses that they are liable with. Organizations that utilize the critical infrastructure must also evaluate the amount of damage caused due to cyber attacks. These organizations must have a contingency plan that would help their businesses to bear no brunt of the cyber attacks.
Network Security
Network security is a technique that enables organizations to secure computer networks from intruders, targeted attackers, and opportunistic malware. As the Internet has an assortment of networks associated with various websites, it is often observed that the organizations become targeted with unauthorized intrusion, with malicious intent. Also, as many websites contain third party cookies, the users’ activities are tracked. Sometimes this might prove helpful for organizations to grow their businesses, but often customers become prey to fraud and sexual exploitation. Hence to counter the cyber attacks and malware associated with the network, organizations must deploy a security program to monitor the internal network and infrastructure. Experts have suggested leveraging Machine learning technology that will alert the authorities in case of abnormal traffic. The organizations must continue to upgrade their network security by implementing policies that can thwart cyber-attacks.
Experts suggest the following methods for upgraded network security:
• Extra Logins
• New Passwords
• Antivirus programs
• Firewalls
• Incognito Mode
• Monitored Internet access
• Encryption
Cloud Security
Most of the organizations are now inclined towards utilizing artificial intelligence to improve their businesses, enhance customer experience, and for efficient operations. With the plethora of data available at each step of organizational set-up, it becomes difficult for organizations to store these data in physical form. Also, it is observed that often this data is unstructured and is derived from unknown sources, which can cause a potential threat to the organization’s network. Hence, Amazon Web Services, Microsoft Azure, and Google Cloud present their customers with a cloud computing platform, where the users can store, and monitor data, by implementing a security tool.
Reports suggest that on-premise environments are highly prone to cyber malware. By integrating the system with a cloud security platform, the users will be rendered with the secured data, thus mitigating the possibility of a cyber-attack.
Internet of Things Security
The Internet of things is being observed to be the next tool for the technological revolution. A report by Bain and Company has estimated the market size for IoT to expand by US$520 billion by the year 2021. With the help of its security network, IoT provides the user with a variety of critical and non-critical appliances such as the appliances, sensors, printers, and wifi-routers amongst routers.
The report suggests that one of the main obstacles for implementing IoT in any organization is the threat to security. By integrating the system with IoT security, organizations are provided with insightful analytics, legacy embedded systems, and secure network.
Application Security
The users get infatuated with different applications, which include hardware, software, and devices. But an application becomes equally prone to cyber-attack or malware like the networks. Application security thwarts the cyber-security infringement by adopting the hardware and software methods at the development phase of the project. With the help of an application security network, the companies and organizations can detect the sensitive data set and secure them with specific applications about the datasets.
Some of the methods associated with application security are:
• Anti-virus Program
• Firewalls
• Encryption Programs
Click here to claim your Sponsored Listing.
Category
Contact the business
Telephone
Website
Address
9411 63rd Avenue Nw
Edmonton, AB
T6E0G2
Opening Hours
Monday | 8am - 4:30am |
Tuesday | 8am - 4:30pm |
Wednesday | 8am - 4:30pm |
Thursday | 8am - 4:30pm |
Friday | 8am - 4:30pm |
10160 103 Street NW
Edmonton, T5J0X6
Redman Tech - No matter where you're at in your real estate career, we've got you covered with sophi
10940 119 Street NW
Edmonton, T5H3P5
We provide world-class Managed IT Services to small + medium businesses in Alberta 🤓💻🛜💼
Suite 101, 15511/123 Avenue NW
Edmonton, T5V0C3
CompuVision is an IT management and consulting company that leverages technological innovations for
166 Avenue NW
Edmonton, T6V0H5
ZPROXIMA Corp. is a Canadian company. It has multiple commercial activities established by multinati
11225 143 Street NW
Edmonton
Accesio is Alberta's leading provider of innovative remote-access solutions.
Edmonton
Edmonton, T4A
We are a Canada Based Design Agency. • We Design UI/UX App & Web Design • We are available for n
Edmonton
Provide Information to Clients about hardware and software. A software Coach for MS Office Products and QuickBooks.
10650 113 Street
Edmonton, T5H3H6
We provide true serverless IT services not only reducing your cost in equipment but providing award
Edmonton, T8A065
🌐 Tech Enthusiast Community 🚀 Empowering Digital Explorers 🌍 Join Us for the Latest Tech Trend
Edmonton, T6E4M9
We Provide Services Like Web Designing, Data Entry, Customer Services, BPO, Digital Marketing.