The Team
Iza Gilson
Born in far away Poland, Iza moved to Campbell River over 30 years ago and never looked back. She's been providing IT support in this area for all of this time, mostly as a self-employed consultant. She came to know many wonderful people, lots of whom became friends over time.
IZCO Technology Solutions is her latest endeavor. She feels very lucky to have teamed up with her business partner, Corey – and that is how IZCO was born.
They both share a passion for new technology and helping people which they believe is a recipe for success in today’s technology field.
Iza handles most of the sales and keeps our service department somewhat on track. She has also been known to do the occasional support call (which is in fact her favorite part of the job).
The rare time that Iza is not working, she loves to hike, read and cook.
Corey Magowan
Corey Magowan has worked in Information Technology since 1999. One of his first jobs was making sure the lights would stay on January 1, 2000. Corey met Iza in 2012 and has been working with her ever since.
Corey has worked supporting corporate environments with servers and workstations, helped develop custom software, been a database administrator for Microsoft SQL, maintained Dynamics, when it was owned by Great Plains. He is also familiar with smaller one to ten person setups and the challenges those might present.
Corey has been living in Campbell River since 2008, when he moved here with his young family. When Corey isn’t working, you can usually find him somewhere in the backwoods walking his dog or riding his bike.
Dave Shook
Born in Toronto, with a stint in Ottawa, Dave grew up on the South Shore of Montreal. After finishing his Bachelor of Science at Concordia University in Montreal, he came west in 1975, and obtained his MBA at UBC in Vancouver. He fell in love with BC and has stayed living on the island for the last 45 years or so.
Dave became a partner in Odyssey Computers in 1990 and moved from Victoria to Campbell River with Odyssey Computers in 1997. In 2019, he and his partners sold Odyssey Computers to the folks at Izco Technology Solutions. Now he gets to do what he enjoys most – help the people of Campbell River by fixing their computers for them. Dave is now the main Bench Technician in the Shop here at Izco Technology Solutions.
Jonathan Pistone
At IZCO Technology Solutions, Jonathan is our Network/Project Guy. You can find him looking after our clients’ networks, while providing expert support.
Born in Los Angeles USA, he moved with his family to Nanaimo, BC, when he was seven. Since then, he’s never strayed far from Vancouver Island, except for some adventures here and there.
While his schooling started in electrical engineering, Jonathan's passion for networking, servers, and everything in-between lead him to working in the IT industry for the past 17 years.
Out of the office, Jonathan enjoys walking his dog along the Sea Walk, hiking out to waterfalls, or mountain biking at Snowden Forest.
Chad Laity
Chad joined the IZCO team in early 2023 after relocating from Chilliwack. He’s been working in technology in BC since earning his Network & Systems Engineer Degree back in 1998. Outside of work Chad enjoys all things outdoors including off-roading, hiking, biking, technology, Mocha’s from Stonehouse Tea and Coffee Shop, and spending time with family and his chocolate lab.
Adam Leighton
Adam is our technician who sets up new computers, creates new email addresses, new users, completes data transferring, does on site delivery, remote help and more.
Although he was born in Medicine Hat, Alberta, Adam spent most of his childhood in Ontario. He moved to Campbell River in 2016- which is now the place he calls home.
Adam has always been interested in electronics, and knew he wanted to work in this field. When he was young, his dad built his own radio, which was very fascinating for him. After piquing his interest, he built his first computer in 2019 and knew this line of work was for him!
Liz Mackay
Liz is our Office Administrator. Her many roles include greeting customers, preparing custom quotes, purchasing, doing the bookkeeping, and watering the plants.
After growing up in Campbell River and graduating from UVic, Liz spent time in Victoria and Calgary supporting health care leaders. She recently moved home to live and play by the ocean.
Outside of work Liz likes to garden, hang out with her husband and dogs, go thrifting, and read books.
Security / Concierge
When they aren't busy napping, Louise and Koper enjoy greeting customers and looking for security risks.
Get the latest news
Join the growing number of business owners and home users that are staying updated with the latest tech news from our Blog. Subscribe to our newsletter to get curated articles and tips that will help you stay secure and connected.
Top 7 Cybersecurity Risks of Remote Work & How to Address Them
Remote work has become increasingly popular in recent times. It provides flexibility and convenience for employees. Additionally, telecommuting reduces office costs for employers. Many also cite productivity benefits due to fewer distractions.Research shows a 56% reduction in unproductive time when working at home vs. the office.But there are some drawbacks to working outside the office.…
Read MorePhishing 2.0: How AI is Amplifying the Danger and What You Can Do
Phishing has always been a threat. Now, with AI, it’s more dangerous than ever. Phishing 2.0 is here. It’s smarter, more convincing, and harder to detect. Understanding this new threat is crucial. A recent study found a 60% increase in AI-driven phishing attacks. This is a wake-up call that phishing is only getting worse. Here’s…
Read MoreStreamlining Success: A Guide to Task Automation for Small Enterprises
Running a small business is a whirlwind. You juggle a million tasks and wear countless hats. You also constantly fight the clock. What if you could reclaim some of that precious time? Enter task automation. It’s your secret weapon for streamlining your workflow and boosting productivity. By automating routine and repetitive tasks, small businesses can…
Read More7 Smart Ways to Secure Your Wireless Printer & Keep Your Home Network Safe
Many people worry about someone hacking their computer. But they’re not really thinking about their wireless printer getting breached. It’s a tool that most individuals use sporadically. For example, when you want to print out tax forms or mailing labels. Printers tend to be out of sight, out of mind. That is until you need…
Read More9 Smart Ways for Small Businesses to Incorporate Generative AI
There is no escaping the relentless march of AI. Software companies are rapidly incorporating it into many business tools. This includes tools like Microsoft 365, Salesforce, and others. Many people are still concerned about where AI will go. But there is no denying that it makes certain work more efficient. It can generate custom images…
Read MoreHow to Organize Your Cybersecurity Strategy into Left and Right of Boom
In the pulsating digital landscape, every click and keystroke echoes through cyberspace. The battle for data security rages on. Businesses stand as both guardians and targets. Unseen adversaries covet their digital assets. To navigate this treacherous terrain takes a two-pronged approach. Businesses must arm themselves with a sophisticated arsenal of cybersecurity strategies. On one side,…
Read MoreOnline Security: Addressing the Dangers of Browser Extensions
Browser extensions have become as common as mobile apps. People tend to download many and use few. There are over 176,000 browser extensions available on Google Chrome alone. These extensions offer users extra functionalities and customization options. While browser extensions enhance the browsing experience, they also pose a danger which can mean significant risks to…
Read More6 Immediate Steps You Should Take If Your Netflix Account is Hacked
Netflix is one of the most popular and well-known streaming services. It has nearly 231 million subscribers around the world. It has been growing steadily for almost a decade. The platform has become an essential part of many people’s daily entertainment routines. They fire up their devices, log in, and pick right back up on…
Read MoreWhat Is the Most Secure Way to Share Passwords with Employees?
Breached or stolen passwords are the bane of any organization’s cybersecurity. Passwords cause over 80% of data breaches. Hackers get in using stolen, weak, or reused (and easily breached) passwords. But passwords are a part of life. Technologies like biometrics or passkeys haven’t yet replaced them. We use them for websites, apps, and more. So,…
Read MoreUnmasking the True Price of IT Downtime
Imagine this: you walk into your office on a busy Monday morning, ready to tackle the week. But something’s wrong. Computers are unresponsive. Phones are silent. The internet is a ghost town. Your business has come to a grinding halt – victim of an IT outage. It’s a scenario every business owner fears. But beyond…
Read MoreSlow Systems?
If your computers and network are slowing you down, we can help. By running diagnostics and optimizing your operating system and apps we'll determine the cause, provide efficient and economic solutions and get the job done with minimal disruption to your workflow.