
Strengthening your cybersecurity policies Formulating strong IT policies and laying down the best practices for your staff to follow is one of the best ways to prevent your business from…
Strengthening your cybersecurity policies Formulating strong IT policies and laying down the best practices for your staff to follow is one of the best ways to prevent your business from…
The Cloud presents plenty of benefits that make it a very attractive choice, especially for SMBs who don’t want to be burdened with higher in-house IT costs, putting your data…
More and more businesses are switching to the Cloud to store their data and rightly so. The Cloud offers numerous benefits over the traditional, physical on site server. For example,…
Protecting yourself against poison attacks Data poisoning by way of logic corruption, data manipulation and data injection happen when the attacker finds a way to access your data set. The…
Why do you need a top-down approach to IT security? For any organization, its employees are its biggest assets. But, what happens when your biggest assets turn out to be…
“You’re FIRED!” ( now give me your password) Losing an employee is not usually a good experience. If they leave voluntarily, you lose a valuable asset. If they have to…
More frequently, I’ve logged into user computers and notice that their right side Windows 10 notification bar is inundated with notifications. A common complaint is that they don’t know how…
Even if you’ve never seen (or heard of) the 1979 horror classic, When a Stranger Calls, you likely have heard the iconic line, “the call is coming from inside the…
This article compares my experiences using the Surface Go and an ASUS Chromebook alternatively for the last several months and reveals the winner. The ASUS C302C Chromebook and the Microsoft…
Today I witnessed first hand a new threat that has successfully infiltrated a friend of mine: a DocuSign phishing email. Hackers have stolen the customer email database of DocuSign, the…
EXECUTIVE SUMMARY: Yet unknown cyber criminals have taken an NSA zero-day threat and weaponized a ransomware strain so that it replicates across networks without user intervention. There is a 2-month old…
I often get asked, “What laptop should I buy?”. In response to that, I wrote a quick and dirty buyers guide that I’ve emailed out to a few individuals….
It has been almost a year since the official release of Windows 10. When it was released, it was offered as a free upgrade on machines that are running Windows…
Ransomware is a major Internet security challenge. This article explains how hackers use it to extort money from their victims and how we can protect ourselves. What is ransomware? In…
Released two years ago, in April 2014, the Galaxy S5 remains the best smartphone on the market. Of course, there are many smartphones that have been released since then, including…
We have found that our customers have found the following cloud services to be most beneficial to their businesses. Google Apps Google Apps for Work has been a very cost-effective…
I don’t normally comment on Apple products, as I don’t use them myself. I’m impacted, however, as most of my family has bought into the Apple ecosystem, including iPhones and…
This article discusses three ways that we help our clients reduce their technology budget. Contact us now if you’d like us to do the same for you. Embrace the Cloud You’ve…
We have recently had the opportunity to install arena schedule digital signage at the Don Hartman Northeast Sportsplex and Cardel Place in Calgary. For both installations, we chose PADS 3.1…
Claritech Solutions Corp is a full-service information technology management company. As a WatchGuard, Google, Microsoft and Dell partner, we are able to provide small and medium-sized organizations with all the tools necessary to cost-effectively and productively operate their IT infrastructure.
This Privacy Policy describes how your personal information is collected, used, and shared when you visit https://claritech.ca/ (the “Site”).
When you visit the Site, we automatically collect certain information about your device, including information about your web browser, IP address, time zone, and some of the cookies that are installed on your device. Additionally, as you browse the Site, we collect information about the individual web pages, products or services that you view, what websites or search terms referred you to the Site, and information about how you interact with the Site. We refer to this automatically-collected information as “Device Information.”
We collect Device Information using the following technologies:
When we talk about “Personal Information” in this Privacy Policy, we are talking both about Device Information and Form Information.
We use the Form Information that we collect generally to validate and process any requests made on the Site (through our Contact Us link, or any of the other download forms). Additionally, we use this Form Information to:
We share your Personal Information with third parties to help us use your Personal Information, as described above. For example, we use Google Analytics to help us understand how our customers use the Site – you can read more about how Google uses your Personal Information here: https://www.google.com/intl/en/policies/privacy/. You can also opt-out of Google Analytics here: https://tools.google.com/dlpage/gaoptout.
Finally, we may also share your Personal Information to comply with applicable laws and regulations, to respond to a subpoena, search warrant or other lawful request for information we receive, or to otherwise protect our rights.
Please note that we do not alter our Site’s data collection and use practices when we see a Do Not Track signal from your browser.
We may update this privacy policy from time to time in order to reflect, for example, changes to our practices or for other operational, legal or regulatory reasons.
For more information about our privacy practices, if you have questions, or if you would like to make a complaint, please visit our contact page for further details on how to contact us.