Enhancing Cybersecurity with Endpoint Detection and Threat Response

Endpoint Security - Endpoint Protection - Multiple Devices Protected Within a Network

How can businesses use Endpoint Detection and Threat Response (EDR) to safeguard sensitive data and systems against cybersecurity threats?

Read the full article Enhancing Cybersecurity with Endpoint Detection and Threat Response

Google is blocking your business emails for the greater good! 

1 paper airplane getting through blockade

Nobody enjoys opening their email to spend the first few moments deleting and marking emails as spam. Everyone is trying their best to combat spam on a personal level. If you want to know more about what you can do, Jeremy McMaster talks about preventing your email from getting hacked in this article.  What are […]

Read the full article Google is blocking your business emails for the greater good! 

The Dangers of Public Wi-Fi

Free wifi

Unencrypted public Wi-Fi networks can be a gateway for hackers and viruses. What can you do to keep your private data safe when using these networks?

Read the full article The Dangers of Public Wi-Fi

Why are governments banning TikTok and should we be concerned?

Shou Chew, chief executive officer of TikTok Inc., bottom right, during a House Energy and Commerce Committee hearing in Washington, DC, US, on Thursday, March 23, 2023.

TikTok has been banned on government devices in Canada, which allows us to ask this crucial question: Should we been concerned about our data privacy and the Chinese-backed app or does the government have it wrong?

Read the full article Why are governments banning TikTok and should we be concerned?

How do AI companies view your privacy?

robot viewing the charter of data privacy

How will OpenAI’s new option to turn off chat history help protect your data privacy?

Read the full article How do AI companies view your privacy?

Why has Microsoft Outlook stopped working?

Basic authentication

Starting in January 2023, Microsoft has stopped supporting Basic authentication in Exchange Online to improve security.

Read the full article Why has Microsoft Outlook stopped working?

Surveillance Creep and its Sinister Impacts

Big brother surveillance photo mosaic

What happens when surveillance measures first installed for beneficial purposes are later used for more sinister purposes?

Read the full article Surveillance Creep and its Sinister Impacts

Log4j – The realities of technology and security

log4j crusader

In the news for the past week has been plethora of information related to the Log4j vulnerability and the massive/sweeping security impact it has had on many companies. First and foremost, know that the Dunham Group Security, Investigation and Response (SIR) team went into immediate action. Upon learning of the Log4j vulnerability all servers under […]

Read the full article Log4j – The realities of technology and security

Microsoft issues urgent security update

Opened padlock logo on alphanumeric background

If you are reading this on a Windows computer, first open your Start menu, type “update”, then check for and install all available updates. Now that you can rest assured your computer is safe, let’s talk about PrintNightmare. Windows computers can share printers with devices on the same network, and that’s a great feature, but […]

Read the full article Microsoft issues urgent security update

Hackers are stealing phone numbers. Are you safe?

Woman holding a phone

From a young age, we all become extremely aware that we should keep our SIN number and bank card information safe and not reveal them to anyone except our employees and the ones closest to us. Nowadays, however, there is a new set of sensitive digits that we have to protect – our phone number. […]

Read the full article Hackers are stealing phone numbers. Are you safe?
  • 1