The Team

DSC_3391

Iza Gilson

Born in far away Poland, Iza moved to Campbell River over 30 years ago and never looked back. She's been providing IT support in this area for all of this time, mostly as a self-employed consultant. She came to know many wonderful people, lots of whom became friends over time.

IZCO Technology Solutions is her latest endeavor. She feels very lucky to have teamed up with her business partner, Corey – and that is how IZCO was born.

They both share a passion for new technology and helping people which they believe is a recipe for success in today’s technology field.

Iza handles most of the sales and keeps our service department somewhat on track. She has also been known to do the occasional support call (which is in fact her favorite part of the job).

The rare time that Iza is not working, she loves to hike, read and cook.

Corey Magowan

Corey Magowan has worked in Information Technology since 1999.  One of his first jobs was making sure the lights would stay on January 1, 2000.  Corey met Iza in 2012 and has been working with her ever since.

Corey has worked supporting corporate environments with servers and workstations, helped develop custom software, been a database administrator for Microsoft SQL, maintained Dynamics, when it was owned by Great Plains.  He is also familiar with smaller one to ten person setups and the challenges those might present.

Corey has been living in Campbell River since 2008, when he moved here with his young family.  When Corey isn’t working, you can usually find him somewhere in the backwoods walking his dog or riding his bike.

DSC_3423
DSC_3270

Dave Shook

Born in Toronto, with a stint in Ottawa, Dave grew up on the South Shore of Montreal.  After finishing his Bachelor of Science at Concordia University in Montreal, he came west in 1975, and obtained his MBA at UBC in Vancouver.  He fell in love with BC and has stayed living on the island for the last 45 years or so.

Dave became a partner in Odyssey Computers in 1990 and moved from Victoria to Campbell River with Odyssey Computers in 1997.  In 2019, he and his partners sold Odyssey Computers to the folks at Izco Technology Solutions. Now he gets to do what he enjoys most – help the people of Campbell River by fixing their computers for them.  Dave is now the main Bench Technician in the Shop here at Izco Technology Solutions.

DSC_3408

Jonathan Pistone

At IZCO Technology Solutions, Jonathan is our Network/Project Guy. You can find him looking after our clients’ networks, while providing expert support.

Born in Los Angeles USA, he moved with his family to Nanaimo, BC, when he was seven. Since then, he’s never strayed far from Vancouver Island, except for some adventures here and there.

While his schooling started in electrical engineering, Jonathan's passion for networking, servers, and everything in-between lead him to working in the IT industry for the past 17 years.

Out of the office, Jonathan enjoys walking his dog along the Sea Walk, hiking out to waterfalls, or mountain biking at Snowden Forest.

Chad Laity

Chad Laity

Chad joined the IZCO team in early 2023 after relocating from Chilliwack. He’s been working in technology in BC since earning his Network & Systems Engineer Degree back in 1998. Outside of work Chad enjoys all things outdoors including off-roading, hiking, biking, technology, Mocha’s from Stonehouse Tea and Coffee Shop, and spending time with family and his chocolate lab.

 

DSC_3364

Adam Leighton

Adam is our technician who sets up new computers, creates new email addresses, new users, completes data transferring, does on site delivery, remote help and more.

Although he was born in Medicine Hat, Alberta, Adam spent most of his childhood in Ontario. He moved to Campbell River in 2016- which is now the place he calls home.

Adam has always been interested in electronics, and knew he wanted to work in this field.  When he was young, his dad built his own radio, which was very fascinating for him. After piquing his interest, he built his first computer in 2019 and knew this line of work was for him!

Liz

Liz Mackay

Liz is our Office Administrator. Her many roles include greeting customers, preparing custom quotes, purchasing, doing the bookkeeping, and watering the plants.

After growing up in Campbell River and graduating from UVic, Liz spent time in Victoria and Calgary supporting health care leaders. She recently moved home to live and play by the ocean.

Outside of work Liz likes to garden, hang out with her husband and dogs, go thrifting, and read books.

dogs at front

Security / Concierge

When they aren't busy napping, Louise and Koper enjoy greeting customers and looking for security risks.

Get the latest news

Join the growing number of business owners and home users that are staying updated with the latest tech news from our Blog. Subscribe to our newsletter to get curated articles and tips that will help you stay secure and connected.

Don’t Be a Victim: Common Mobile Malware Traps

Your smartphone is a digital wallet, communication hub, and personal assistant. All rolled into one portable device. It’s packed with sensitive data, from financial information to personal photos. This makes it a prime target for cybercriminals. Mobile malware is often overlooked. People focus on securing their laptops or desktops. But they don’t pay as close attention…

Read More

Introducing the New Microsoft Planner (Everything You Need to Know)

Calendars, task lists, and project planning are important business tools. Many people use Microsoft’s apps to power these processes. Including Planner, Microsoft To Do, and Project for the web. These tools help keep processes on track and enable task accountability. But they’re separate apps. Switching between apps can be cumbersome. It adds more complexity to…

Read More

Does Your Business Have Any “Cybersecurity Skeletons” in the Closet?”

Let’s dive into a topic that might give you the chills—cybersecurity skeletons in the closet. You may not have old skeletons hidden away in the basement. But there’s a good chance of cybersecurity vulnerabilities lurking in the shadows. Just waiting to wreak havoc. You can’t fix what you can’t see. It’s time to shine a…

Read More

Ultimate Guide to Encryption Methods

Encryption is a method of securing information. It converts readable data into secret code. Only the right key can decode it. This guide will help you understand different encryption methods. What is Encryption? Encryption is like a secret language. It converts regular text into unreadable text. This unreadable text is called ciphertext. Only people who…

Read More

How Small Businesses Are Unlocking Growth With Generative AI

Staying ahead in business often means embracing cutting-edge technologies. New tools can unlock new avenues for growth especially for small businesses. SMBs are often looking for affordable ways to gain a competitive advantage. One such transformative force is Generative Artificial Intelligence (GenAI). This is a technology that goes beyond automation and the AI we used…

Read More

Is It Time to Ditch the Passwords for More Secure Passkeys?

Passwords are the most used method of authentication, but they are also one of the weakest. Passwords are often easy to guess or steal. Also, many people use the same password across several accounts. This makes them vulnerable to cyber-attacks. The sheer volume of passwords that people need to remember is large. This leads to…

Read More

Handy Checklist for Handling Technology Safely During a Home or Office Move

Moving can be a chaotic and stressful time. Especially when it comes to handling your valuable technology. Whether you’re relocating your home or office, it’s essential to take extra care. Both with fragile items and when packing and moving your devices and other tech items. To help you navigate this process smoothly, we’ve put together…

Read More

5 Common Cyber Threats in 2025 (and How To Avoid Them)

In 2025, cyber threats are in almost every nook and corner. They might be with the intent to destroy computers, steal data, or take money. Understanding what they are and how protection against them works will come in handy. What Are the Most Common Cyber Threats? They come in so many forms, some old, some…

Read More

7 Important Considerations Before You Buy Smart Home Tech  

Smart homes seem like something straight out of a sci-fi movie. They have lights that respond to your voice commands and thermostats that auto-adjust. Not to mention robot vacuums that clean your floors while you relax. It’s all very tempting. But before you rush out and buy the newest gadget, there are some crucial considerations.…

Read More

6 Reasons Access Management Has Become a Critical Part of Cybersecurity

Cybersecurity has become paramount for businesses and individuals alike. Cyber threats abound, and data breaches and malware attacks are costly. Attacks come from all sectors, including the cloud tools you use every day. The average employee uses 36 cloud-based services daily. Managing access to sensitive data and resources has become crucial. It’s a vital piece…

Read More
hour-glass

Slow Systems?

If your computers and network are slowing you down, we can help. By running diagnostics and optimizing your operating system and apps we'll determine the cause, provide efficient and economic solutions and get the job done with minimal disruption to your workflow.