What is a Disaster Recovery Plan?

Graphs and bars on a screen including an incomplete puzzle with a cursor moving an orange puzzle piece

As our lives and businesses become reliant on technology, there is a growing threat of IT disasters impacting people’s lives. To combat this, it’s important for companies to have a disaster recovery plan. When creating a plan there are some things you need to know.

Read the full article What is a Disaster Recovery Plan?

CrowdStrike: 8.5 million strikes and they’re out!

Windows 11 blue screen on an airport information board.

On Friday July 19th, 8.5 million Window computers displayed the infamous “Blue Screen of Death”, causing global panic. Flights, online transactions, and emergency services all came to a halt. What you might not know is how common these issues really are.

Read the full article CrowdStrike: 8.5 million strikes and they’re out!

Dunham does more than you may know

Illustration of a hands coming out of a laptop screen with holograms of various IT, computer, and security icons

Can you name all the services the Dunham Connect offers? Even our long term clients are occasionally surprised when we tell them that we can help them with a certain problem. Maybe you don’t know we act as a one-stop shop for all your digital and hardware needs.

Read the full article Dunham does more than you may know

What is Wi-Fi 7?

Wooden cube blocks flipping from words WiFi 6e to WiFi 7.

Wi-Fi allows people to connect to the internet to talk with their friends across the globe, stream their favorite TV shows, and do a million other things. As you read this blog, most of you likely are using Wi-Fi 5 or 6. But have you heard of Wi-Fi 7? 

Read the full article What is Wi-Fi 7?

The Do’s and Don’ts of Password Security

Notebook with multiple passwords.

Passwords are the least secure and most often compromised method of security. So, how can you best prevent nefarious hackers from getting your information? We’ll go over some quick and easy methods to implement that’ll help protect yourself online.

Read the full article The Do’s and Don’ts of Password Security

How to prevent a ransomware attack

Ransomware

With the recent ransomware attack on the City of Hamilton in the news, now is a good time to check your own business practices and ensure you are not the next victim of a cyber-attack. Here are some simple practices that can keep your organization safe.

Read the full article How to prevent a ransomware attack

How to Make Sure Your Email is Safely Delivered

Hand of businessman using smartphone for email with notification alert.

Are your work emails not being delivered? If so, it could be because you have not updated your Domain Name System (DNS) with the records that tell email providers that your email is safe. Here is a brief introduction to SPF, DKIM and DMARC, and why they are important to include in your DNS records.

Read the full article How to Make Sure Your Email is Safely Delivered

Preparing Your Organization for the End of Windows 10 Support

Windows 10 end-of-life

A significant technological shift on the horizon is the impending end of support for Windows 10.

Read the full article Preparing Your Organization for the End of Windows 10 Support

Google’s data collection, how it’s used, and how to manage it

Opened padlock logo on alphanumeric background

Most of us use Google to search for everything from shoes to diseases. We most often do so without thinking about what Google learns from our searches, and how that information is used.

Read the full article Google’s data collection, how it’s used, and how to manage it

Enhancing Cybersecurity with Endpoint Detection and Threat Response

Endpoint Security - Endpoint Protection - Multiple Devices Protected Within a Network

How can businesses use Endpoint Detection and Threat Response (EDR) to safeguard sensitive data and systems against cybersecurity threats?

Read the full article Enhancing Cybersecurity with Endpoint Detection and Threat Response