The Global Chip Shortage: What It Is, And How It Happened

many hands reaching for only one chip

By now, you’ve been affected by the global chip shortage directly or indirectly. We’re two plus years into the global chip shortage, and the end is not close. It is affecting most major industries across the globe, due to major strains on supply chains and massive increase in demand. So, what is it? The global […]

Log4j – The realities of technology and security

log4j crusader

One of the lesser reported issues is that Log4j is actually baked into (a part of) many software applications commonly deployed on websites/applications.

Microsoft issues urgent security update

Opened padlock logo on alphanumeric background

If you are reading this on a Windows computer, first open your Start menu, type “update”, then check for and install all available updates. Now that you can rest assured your computer is safe, let’s talk about PrintNightmare. Windows computers can share printers with devices on the same network, and that’s a great feature, but […]

Announcement regarding Ontario State of Emergency

Remote IT support

First and foremost, thank you for being a valued client or future client of Dunham Connect. We appreciate working with all of our partners especially during these ever changing and challenging times. Ontario has declared a state of emergency requiring people to stay at home whenever possible. Non-essential businesses and schools are being forced to […]

How to prevent your email from getting hacked

Email service

If you have a computer or a phone, chances are you have at least one email account. Emailing has cemented itself as a vital form of communication and is here to stay. While there are a great many benefits of using email as your form of communication, there has been an epidemic of spam that […]

Hackers are stealing phone numbers. Are you safe?

Woman holding a phone

From a young age, we all become extremely aware that we should keep our SIN number and bank card information safe and not reveal them to anyone except our employees and the ones closest to us. Nowadays, however, there is a new set of sensitive digits that we have to protect – our phone number. […]

How to keep your smart phone safe from hackers

Man using a phone

In today’s society, our phone has moved far beyond being an integral form of communication and is now being used in every way imaginable. We use our cellphones for shopping, business, entertainment, and just about everything you can use your computer for. Since 2013 mobile web traffic has risen from 16.2% to an astonishing 52.2% […]

Your phone’s security features you may not know about

iPhone Image

Over the past decades, the cellphone has evolved from a simple communication device to an all-in-one smart device that has over 100,000 times the processing power of the computer that landed us on the moon. Thanks to this advancement in technology the features for your phone have grown exponentially, to a point where many phone […]

Security hacks that will save you from yourself

Photo of Secure Phone

One of the most common attacks today involves hackers deploying automated systems that break into accounts which allows them to access sensitive information that they can then exploit in a number of ways. These attacks are growing in both frequency and sophistication and threaten businesses and individuals alike. While no one is truly 100% secure, […]

Less talk more action – how to be cybersecure

Ransomware

Cybersecurity is a very broad topic that covers a whole range of technologies and hurdles that need to be addressed in order to keep your company secure. The best defense is preparation and knowledge, and there are few better ways than to learn that from experts in the industry such as Jeremy McMaster, our in-house […]

  • 1

Contact us today for a consultation