Category:

Blog

What is Maze Ransomware and How Does it Work?

Maze Ransomware has been in the headlines non-stop ever since it was first reported in May 2019, when its authors used “Missed package delivery” and “Your AT&T wireless bill is ready to view” emails to trick recipients into opening messages with malicious payloads. Maze has been used to attack individual companies, governments, and increasingly – and perhaps most worryingly –…
Read article

The Current Microchip Shortage and its Impact on the IT Supply Chain

Microchips have become an integral part of twenty-first-century technology. Although small in size, these sets of electronic circuits printed on silicon wafers have proved their value to the world of IT. From phone and laptop manufacturers to cars and medical equipment, microchips serve as the processors for these everyday products. They are implanted in our favorite devices to help them…
Read article

Top Technology Trends of 2021

By Michael Hensley, Director of Professional Services Like millions of other people in the world, I’m looking forward to ridding my hands of 2020 and starting fresh in the new year. While the pandemic has left an indisputable mark on our planet, recent advancements in technology have provided much-needed hope and optimism for the future. When looking ahead to the…
Read article

Webinar Highlights: Protecting Your Data in 2020 and Beyond

Data privacy and security are two initiatives that have become top priorities for business and IT leaders around the world in recent years. While maintaining a secure environment is critically important in safeguarding an organization’s private information, the shift to a remote workforce has allowed cybercriminals to cause significant business disruption. For months, hackers have effectively taken advantage of employees’…
Read article

The Importance of Two-Factor Authentication

By Michael Hensley, Director of Professional Services Ready for the eye-opening stat of the day? Since the start of COVID-19, the FBI and its IC3 (Internet Crime Complaint Center) has reported a 300% increase in reported cybercrime activity. This starting rise in the frequency of cyberattacks has prompted companies—especially those with vulnerable networks due to increases in work-from-home activity—to enhance…
Read article

A Global MSP Status Report

By Pete Petrella, Director of Business Development Our friends at Datto conducted two recent studies to generate a more comprehensive understanding of managed service providers (MSPs). Titled “The Global State of the MSP Report,” over 1,800 MSP providers from around the world were surveyed. The reports gathered an abundance of data and feedback from participating organizations. From the emergence of…
Read article

IT Protection Checklist: Staying Cyber-Secure When Returning to Work

By Michael Hensley, Director of Professional Services As our communities have begun taking significant strides in easing shutdown restrictions and entering new phases of reopening, many businesses have begun to follow suit. While the number of COVID-19 cases continues to drop nationwide, our nation’s economy has surged in recent weeks as restaurants, retail stores, hair salons, and other small businesses…
Read article

Stay in Touch with IT: Top Ten IT Blogs and Sites to Follow

Stay in Touch with IT: Top Ten IT Blogs and Sites to Follow As businesses continue to adapt to the new normal, it’s important to stay up to speed on the latest news in the IT industry. Trends like cybersecurity and work-from-home strategies remain top of mind among many organizations. We understand as times continue to change, so does the…
Read article

Video: How to Solve Cybersecurity Challenges During COVID-19

As the COVID-19 crisis continues to evolve, we are making every effort to help your business stay safe from cyberthreats and other IT challenges. We teamed up with our trusted partners at Cyberstone to put together this informational video, which covers: Hacking campaigns and phishing attacks Trickbot banking trojans Tips from the National Cyber Security Center Virtual Private Networks (VPN)…
Read article

3 Cybersecurity Tips for Business Contuinity

As the COVID-19 situation continues to unfold globally, cybersecurity has never been more important for businesses in all industries. COVID-19-themed hacking campaigns and phishing attacks are on the rise, and many employers are telling their employees to work from home. Companies need to take the proper precautions to maintain business continuity. At Lume Strategies, we want to make sure companies…
Read article