Blog

Stay in Touch with IT: Top Ten IT Blogs and Sites to Follow

Stay in Touch with IT: Top Ten IT Blogs and Sites to Follow As businesses continue to adapt to the new normal, it’s important to stay up to speed on the latest news in the IT industry. Trends like cybersecurity and work-from-home strategies remain top of mind among many organizations. We understand as times continue to change, so does the…
Read article

Video: How to Solve Cybersecurity Challenges During COVID-19

As the COVID-19 crisis continues to evolve, we are making every effort to help your business stay safe from cyberthreats and other IT challenges. We teamed up with our trusted partners at Cyberstone to put together this informational video, which covers: Hacking campaigns and phishing attacks Trickbot banking trojans Tips from the National Cyber Security Center Virtual Private Networks (VPN)…
Read article

3 Cybersecurity Tips for Business Contuinity

As the COVID-19 situation continues to unfold globally, cybersecurity has never been more important for businesses in all industries. COVID-19-themed hacking campaigns and phishing attacks are on the rise, and many employers are telling their employees to work from home. Companies need to take the proper precautions to maintain business continuity. At Lume Strategies, we want to make sure companies…
Read article

3 Tips to Cybersecurity Safety and Business Continuity During COVID-19

As we all work together to get through this COVID-19 crisis, let’s focus on safety and business continuity. At Lume, we're here to keep your business safe while your employees are working from home. Here are some thoughts on how you can stay safe and productive at the same time. 1. REMOTE WORK BEST PRACTICES Many of us will need…
Read article

4 Reasons to Employ Remote Monitoring and Management

As your partners in holistic IT solutions, our top priority is effectively managing your network and technology assets to keep them safe and optimized so you stay productive. To do this, we leverage Datto Remote Monitoring and Management (RMM) to manage and protect your business. We use this platform to deliver premier monitoring and management services of your technology assets,…
Read article

Should Your Company Co-Manage IT?

Key factors to help you decide what’s best for your company. IT service providers deliver the technical expertise small businesses need at a much lower cost than hiring IT staff. They can recommend, install, and manage technology according to business’ objectives and core competencies and ensure that critical data is safe. That’s why nearly 70% of U.S. small to medium…
Read article

5 Ways to Prepare for the Windows 10 Update

Microsoft has announced that it will stop supporting Windows 7 after January 14, 2020, which means it will no longer provide tech support, software updates, or security updates to Windows 7 PC users. If you plan on using Windows 7 on your PC after this date, your computer will still work, “but it may become more vulnerable to security risks…
Read article

5 Answers to Cybersecurity in the Workplace

A couple weeks ago, we told you about the five can’t-miss events at the NY Tech Summit. Today, we’re recapping one of those five things: Mike Hensley’s speech about why small businesses are prone to cyberattacks. Here’s what our Senior Manager of IT Solutions had to say. Why are small businesses at risk? Most small businesses conduct their business online,…
Read article

5 Can’t-Miss Events at the NY Tech Summit

Heading to the NY Tech Summit at the Turning Stone Casino on Wednesday, June 5? If not, we hope you’ll consider joining us. For those of you who’ll be in attednance, here’s what to look out for (other than the slots, shows, and gaming tables).   1. Keynote Speaker: Merril Hoge “Who is Merril Hoge?” “WHO IS MERRIL HOGE?!” He’s…
Read article

4 Key Takeaways from the New NIST Cybersecurity Framework

Last year, the National Institute of Standards and Technology (NIST) updated its cybersecurity framework, an industry-best outline for how to improve the security and resilience of your IT infrastructure. It’s a complex document, so we put together this quick list of key takeaways. 1. The framework is designed to help you: Describe your current cybersecurity posture Identify your target state…
Read article