Fake Job Offer warning

Hi, we’ve received reports over the last few days of a job offer email from us, Performance Advantage. These emails are not real, here is no job, and we do not post jobs by sending emails – we use job posting sites. Please be aware, if you reply to the job offer email you’ll receive…

Read more

Doing More with SugarCRM

At Performance Advantage we have one clear mission for our company – to help our clients leverage technology to achieve their business goals.   One challenge we encounter frequently is that some businesses problems have no exact match to off-the-shelf products – unique requirements either complicate the solution or require that multiple components be integrated…

Read more

The Business Guide to Cyber Security

Cyber security is a hot issue. But why is it important to someone who runs a business? Because you’ve worked hard to build your business. To serve your customers. To win new business. Yet it all can be stolen from you. Years of hard work down the drain — if you don’t understand the business…

Read more

The True Cost of Cloud

How a free server ends up costing thousands Moving to the cloud saves money, right? After all, you have no servers to purchase, no data centre to pay for. Better still, you pay only for what you use. So why are many companies surprised when they get the bill? In a recent paper on this…

Read more

Big Data as a Security Solution?

Splunk is a big data BI analytics tool that allows you to do deep dives into your data, especially into your machine data. But Splunk is also presenting itself as a security solution. I was at the Splunk Live conference in Toronto last week, and fully a third of the sessions were focused on using…

Read more

Webinar – Why you need a virtual Chief Information Security Officer (CISO)

The webinar “Hiring a Virtual Chief Information Security Officer” was held October 3 rd , 2018. Hosted by ITWC CIO Jim Love and sponsored by Performance Advantage, the session looked at the privacy rules, threats, and customer demands that are putting pressure on company security resources. Michael Ball, a virtual Chief Information Security Officer, outlined…

Read more

A Practical Guide to Data Analytics

Download The Practical Guide to Data Analytics for real-world insights into how companies of all sizes can apply data analytics, as well as a roadmap to create a data culture in your organization.The guide will give you a basic overview of how you can apply data analytics in your business. It provides: A recognition of…

Read more

Security Bulletin – Meltdown and Spectre

Meltdown and Spectre exploits – what you should know This week, two new vulnerabilities have been identified that impact almost all computers.   The vulnerability lies within Intel, AMD and ARM CPUs that were released anytime after 1995.  The exposure from this weakness is profound.  It impacts almost all laptops and desktops, as well as servers…

Read more