Dunham does more than you may know

Illustration of a hands coming out of a laptop screen with holograms of various IT, computer, and security icons

Can you name all the services the Dunham Connect offers? Even our long term clients are occasionally surprised when we tell them that we can help them with a certain problem. Maybe you don’t know we act as a one-stop shop for all your digital and hardware needs.

Read the full article Dunham does more than you may know

What is Wi-Fi 7?

Wooden cube blocks flipping from words WiFi 6e to WiFi 7.

Wi-Fi allows people to connect to the internet to talk with their friends across the globe, stream their favorite TV shows, and do a million other things. As you read this blog, most of you likely are using Wi-Fi 5 or 6. But have you heard of Wi-Fi 7? 

Read the full article What is Wi-Fi 7?

The Do’s and Don’ts of Password Security

Notebook with multiple passwords.

Passwords are the least secure and most often compromised method of security. So, how can you best prevent nefarious hackers from getting your information? We’ll go over some quick and easy methods to implement that’ll help protect yourself online.

Read the full article The Do’s and Don’ts of Password Security

How to prevent a ransomware attack

Ransomware

With the recent ransomware attack on the City of Hamilton in the news, now is a good time to check your own business practices and ensure you are not the next victim of a cyber-attack. Here are some simple practices that can keep your organization safe.

Read the full article How to prevent a ransomware attack

How to Make Sure Your Email is Safely Delivered

Hand of businessman using smartphone for email with notification alert.

Are your work emails not being delivered? If so, it could be because you have not updated your Domain Name System (DNS) with the records that tell email providers that your email is safe. Here is a brief introduction to SPF, DKIM and DMARC, and why they are important to include in your DNS records.

Read the full article How to Make Sure Your Email is Safely Delivered

Preparing Your Organization for the End of Windows 10 Support

Windows 10 end-of-life

A significant technological shift on the horizon is the impending end of support for Windows 10.

Read the full article Preparing Your Organization for the End of Windows 10 Support

Google’s data collection, how it’s used, and how to manage it

Opened padlock logo on alphanumeric background

Most of us use Google to search for everything from shoes to diseases. We most often do so without thinking about what Google learns from our searches, and how that information is used.

Read the full article Google’s data collection, how it’s used, and how to manage it

Enhancing Cybersecurity with Endpoint Detection and Threat Response

Endpoint Security - Endpoint Protection - Multiple Devices Protected Within a Network

How can businesses use Endpoint Detection and Threat Response (EDR) to safeguard sensitive data and systems against cybersecurity threats?

Read the full article Enhancing Cybersecurity with Endpoint Detection and Threat Response

Google is blocking your business emails for the greater good! 

1 paper airplane getting through blockade

Nobody enjoys opening their email to spend the first few moments deleting and marking emails as spam. Everyone is trying their best to combat spam on a personal level. If you want to know more about what you can do, Jeremy McMaster talks about preventing your email from getting hacked in this article.  What are […]

Read the full article Google is blocking your business emails for the greater good! 

Microsoft 365 vs Google Workspace

Google vs Microsoft boxing match

Google and Microsoft both offer an amazing suite of products to improve office collaboration and productivity. Which is best for your business, and how should you use them?

Read the full article Microsoft 365 vs Google Workspace