Over the years, Broadview has strategically built close relationships with a highly select group of Partners. From the strength of this Partner Community, Broadview delivers comprehensive IT Infrastructure solutions. Our customers benefit since a community of support stands behind every Broadview solution. This vendor community also provides Broadview the Resources and support to remain at the forefront of IT infrastructure solutions.

Getting the Most out of Office 365

Microsoft Office still dominates the Canadian workspace, and very much remains the reigning champion of the business productivity software world. Google Docs, Apple iWork, and virtually every competitor to the throne can effectively be summed up as “it’s like Office, but…”. It’s virtually ubiquitous, with over 80% of business in Canada, the US, and the…

HUDDLE ROOMS

“Nothing changes until it changes.” Maybe that’s a bit out of date. Technology continues to evolve and advance at greater speeds and larger scales than ever before. The way we work is changing, too. Open-concept offices and rising real estate costs are contributing to a reduction of the number of individual offices, and the normalization…

Benefits of Online Data Storage

For businesses, cloud services are a great method of storing digital data. While they used to rely on in-house servers to store their growing collections of online files, many small businesses are now transferring those services to online data storage services, such as OneDrive. Businesses experience a number of benefits from storing their data in…

How Much Downtime Can You Tolerate?

Downtime comes in all shapes and sizes. Whether it’s a catastrophic storm, a data center outage, ransomware, internet outage or even a careless mistake. No one is totally safe, and it isn’t a question of it, but instead when it will strike. Your biggest downtime threat may be your employees, but it comes in many…

IT Productivity & Security Forum – Partner Spotlight

On October 19th, Broadview Networks brought together IT professionals, security experts, and technology vendors for a discussion around technology solutions. These solutions are designed from the ground up to modernize their workplaces and to protect them from external and internal threats. With a focus on business continuity, the forum provides a productive venue to collaborate…

Protect your Network Every Minute of Every Day

Infect networks with different forms of malware Cybercriminals use different types of malware to attack networks. The five most typical types are viruses, worms, Trojans, spyware, and adware. Computer viruses were originally spread through the sharing of infected floppy disks. As technology evolved, so too did the distribution method. Today, viruses are commonly spread through file sharing, web downloads, and email…