CrowdStrike: 8.5 million strikes and they’re out!

Windows 11 blue screen on an airport information board.

On Friday July 19th, 8.5 million Window computers displayed the infamous “Blue Screen of Death”, causing global panic. Flights, online transactions, and emergency services all came to a halt. What you might not know is how common these issues really are.

Read the full article CrowdStrike: 8.5 million strikes and they’re out!

Dunham does more than you may know

Illustration of a hands coming out of a laptop screen with holograms of various IT, computer, and security icons

Can you name all the services the Dunham Connect offers? Even our long term clients are occasionally surprised when we tell them that we can help them with a certain problem. Maybe you don’t know we act as a one-stop shop for all your digital and hardware needs.

Read the full article Dunham does more than you may know

The Do’s and Don’ts of Password Security

Notebook with multiple passwords.

Passwords are the least secure and most often compromised method of security. So, how can you best prevent nefarious hackers from getting your information? We’ll go over some quick and easy methods to implement that’ll help protect yourself online.

Read the full article The Do’s and Don’ts of Password Security

How to prevent a ransomware attack

Ransomware

With the recent ransomware attack on the City of Hamilton in the news, now is a good time to check your own business practices and ensure you are not the next victim of a cyber-attack. Here are some simple practices that can keep your organization safe.

Read the full article How to prevent a ransomware attack

How to Make Sure Your Email is Safely Delivered

Hand of businessman using smartphone for email with notification alert.

Are your work emails not being delivered? If so, it could be because you have not updated your Domain Name System (DNS) with the records that tell email providers that your email is safe. Here is a brief introduction to SPF, DKIM and DMARC, and why they are important to include in your DNS records.

Read the full article How to Make Sure Your Email is Safely Delivered

Enhancing Cybersecurity with Endpoint Detection and Threat Response

Endpoint Security - Endpoint Protection - Multiple Devices Protected Within a Network

How can businesses use Endpoint Detection and Threat Response (EDR) to safeguard sensitive data and systems against cybersecurity threats?

Read the full article Enhancing Cybersecurity with Endpoint Detection and Threat Response

Google is blocking your business emails for the greater good! 

1 paper airplane getting through blockade

Nobody enjoys opening their email to spend the first few moments deleting and marking emails as spam. Everyone is trying their best to combat spam on a personal level. If you want to know more about what you can do, Jeremy McMaster talks about preventing your email from getting hacked in this article.  What are […]

Read the full article Google is blocking your business emails for the greater good! 

The Dangers of Public Wi-Fi

Free wifi

Unencrypted public Wi-Fi networks can be a gateway for hackers and viruses. What can you do to keep your private data safe when using these networks?

Read the full article The Dangers of Public Wi-Fi

Why are governments banning TikTok and should we be concerned?

Shou Chew, chief executive officer of TikTok Inc., bottom right, during a House Energy and Commerce Committee hearing in Washington, DC, US, on Thursday, March 23, 2023.

TikTok has been banned on government devices in Canada, which allows us to ask this crucial question: Should we been concerned about our data privacy and the Chinese-backed app or does the government have it wrong?

Read the full article Why are governments banning TikTok and should we be concerned?

How do AI companies view your privacy?

robot viewing the charter of data privacy

How will OpenAI’s new option to turn off chat history help protect your data privacy?

Read the full article How do AI companies view your privacy?
  • 1
  • 2