Infrastructure

Your IT infrastructure is crucial to the success of your organization. Whether you need to improve your current network to ensure more efficient use of hardware, or require a disaster...

User Experience

Global Edge can assist you in business transformation, by integrating productivity tools and platforms that work together to..

Managed Services

Managed Services

Managed services simplify IT operations and reduce investment by delivering systems and applications as an externally administered service. They provide organizations with predictable monthly costs, access to best-of-breed IT and...

cloud it solutions

Cloud

From taking the business to remote locations to making collaboration easier, Cloud IT is changing the face of modern, small and medium-sized businesses all over the world. And Calgary is...

business applications

Applications

Global Edge has experienced, certified technicians that can assist businesses with most of the major applications available. These are some of the applications we support for a variety of clients.

Procurement & Licensing

Procurement/Licensing

Global Edge provides both Procurement and Licensing assistance to our clients. We provide the best possible pricing for both hardware and software purchases. We understand that purchasing new equipment and...

Data Security

Security

With the increasing sophistication of threats and the rise of hackers eager to breach the security of IT systems and applications, Global Edge can help you ensure that your organizations...

blog

Activity Summary – Week Ending November 9, 2018

The TrickBot malware family has been around for many years, initially focused on stealing victim’s online banking credentials. However, FortiGuard Labs has analyzed some new samples where we have found TrickBot, utilizing a new module, has evolved to much more trickery.

Read More

Activity Summary – Week Ending November 2, 2018

Cybercrime-as-a Service has created an entry point for novice distributed denial-of-service (DDoS) attackers by offering simple options to anonymously attack nearly any website and forcing it offline. Due to the public release of source code for some popular bots, building a botnet to provide these sort of services is easier than ever. Minor modifications to …

Read More

Activity Summary – Week Ending October 26, 2018

Attackers have always been seeking new avenues for exploitation; short of discovering zero days themselves. Many attackers have relied on known vulnerabilities either disclosed responsibly or irresponsibly to a vendor. Also, even if there is a patch available, such as the industry standard Patch Tuesday cycle by Microsoft/Adobe, attackers have taken said patches from vendors …

Read More

Activity Summary – Week Ending October 5, 2018

FortiGuard Labs recently encountered malicious traffic traveling to a C2 server located in China. The connection was established by a domain using a name that closely resembled one of Japan’s most famous express post delivery services. Our analysis showed that the website making this connection is fake, there is no SSL certificate, and the page …

Read More