Why has Microsoft Outlook stopped working?

Basic authentication

Starting in January 2023, Microsoft has stopped supporting Basic authentication in Exchange Online to improve security.

Read the full article Why has Microsoft Outlook stopped working?

Surveillance Creep and its Sinister Impacts

Big brother surveillance photo mosaic

What happens when surveillance measures first installed for beneficial purposes are later used for more sinister purposes?

Read the full article Surveillance Creep and its Sinister Impacts

Log4j – The realities of technology and security

log4j crusader

In the news for the past week has been plethora of information related to the Log4j vulnerability and the massive/sweeping security impact it has had on many companies. First and foremost, know that the Dunham Group Security, Investigation and Response (SIR) team went into immediate action. Upon learning of the Log4j vulnerability all servers under […]

Read the full article Log4j – The realities of technology and security

Microsoft issues urgent security update

Opened padlock logo on alphanumeric background

If you are reading this on a Windows computer, first open your Start menu, type “update”, then check for and install all available updates. Now that you can rest assured your computer is safe, let’s talk about PrintNightmare. Windows computers can share printers with devices on the same network, and that’s a great feature, but […]

Read the full article Microsoft issues urgent security update

Hackers are stealing phone numbers. Are you safe?

Woman holding a phone

From a young age, we all become extremely aware that we should keep our SIN number and bank card information safe and not reveal them to anyone except our employees and the ones closest to us. Nowadays, however, there is a new set of sensitive digits that we have to protect – our phone number.

Read the full article Hackers are stealing phone numbers. Are you safe?

How to keep your smart phone safe from hackers

Man using a phone

In today’s society, our phone has moved far beyond being an integral form of communication and is now being used in every way imaginable. We use our cellphones for shopping, business, entertainment, and just about everything you can use your computer for. Since 2013 mobile web traffic has risen from 16.2% to an astonishing 52.2% […]

Read the full article How to keep your smart phone safe from hackers

Your phone’s security features you may not know about

iPhone Image

Over the past decades, the cellphone has evolved from a simple communication device to an all-in-one smart device that has over 100,000 times the processing power of the computer that landed us on the moon. Thanks to this advancement in technology the features for your phone have grown exponentially, to a point where many phone […]

Read the full article Your phone’s security features you may not know about

Security hacks that will save you from yourself

Photo of Secure Phone

One of the most common attacks today involves hackers deploying automated systems that break into accounts which allows them to access sensitive information that they can then exploit in a number of ways. These attacks are growing in both frequency and sophistication and threaten businesses and individuals alike. While no one is truly 100% secure, […]

Read the full article Security hacks that will save you from yourself

Less talk more action – how to be cybersecure

Ransomware

Cybersecurity is a very broad topic that covers a whole range of technologies and hurdles that need to be addressed in order to keep your company secure. The best defense is preparation and knowledge, and there are few better ways than to learn that from experts in the industry such as Jeremy McMaster, our in-house […]

Read the full article Less talk more action – how to be cybersecure

Cybersecurity: It starts with you

Hacker Hacking a Company

Did you know that cyber-attacks are one of the fastest-growing crimes in Canada? In the past few years, there have been many significant data and security breaches globally that have affected millions of users and some of the largest companies in the world. Some of the most notable breaches in the past few years are: […]

Read the full article Cybersecurity: It starts with you