Category:

Blog

One Surprising Trend within IT Staffing

There’s good news at the helm for IT professionals and those graduating with tech-related degrees. According to a survey by Robert Half, managers plan to expand their teams and add more tech talent by the end of 2018. The advancing and upgrading of technological systems is occurring more rapidly than the hiring of associates able to address these issues. This…
Read article

2018 NY Tech Summit: A Recap

Lume Strategies attended the 2018 NY Tech Summit last week, held at the Turningstone Casino Resort in Central New York. In addition to exhibiting and meeting with both vendors and buyers, Lume also attended the educational breakout sessions and was a featured panelist. The two-day event featured sessions revolving around four key themes: Functional Security IT Evolution Transformational Leadership Lifecycle…
Read article

Lume Strategies Sponsors Annual Cheektowaga Chamber of Commerce Golf Outing

On May 22nd, the Cheektowaga Chamber of Commerce sponsored their annual Golf Outing, held this year at Chestnut Hill Golf Course in Darien Center, New York. Although rainy weather and cooler temperatures persisted, they didn’t stop the 144 scheduled golfers from enjoying the day and participating in various activities throughout the afternoon and evening. Lume Strategies was a 2018 event…
Read article

Equifax Hack May Have Been Worse Than Initially Reported

Around September of last year we reported one of the largest data breaches in history, as 148 millions people had their information leaked due to hackers. As you may recall Equifax, one of the largest credit bureaus in the country, was compromised by cyber criminals, and a huge amount of vital confidential information was leaked. Anything from social security numbers,…
Read article

RaaS, ‘Ransomware As a Service’ | Cybercrime Rising

Just a few years ago you may not have even heard the term ransomware. Today the word is littered throughout just about every IT message, preaching the importance of cybersecurity. It’s true. Cybercrime is certainly on the rise, and more and more criminals are joining the party. According to Sophos Research, over 50% of organizations were struck by ransomware last…
Read article

Global Megatrends in Cybersecurity

Cyberattack is becoming more and more difficult to stop. Companies all over the globe have found themselves in a whirlwind of stress over potential cyberattack. Most of us know about the huge companies that have been hit by cybercrime, but the trend isn’t moving in the right direction. As information security changes, as do the criminals. Ponemon recently did a…
Read article

Is Your IT Department Up to Par?

It seems that many small to medium sized businesses are starting to look at the option of turning to an outsourced IT team to help handle the load. With as much information being shared across your network, coupled with the all time high dependence on technology for workflow, one can see how having a trusted IT partner could be beneficial.…
Read article

Ponemon Institute IT Study | What Does a Data Breach Cost?

How much does your organization value protecting data from cybercrime? You’ve probably heard about many of the large corporations being exposed to data breach, and maybe you have had a meeting about the importance. Today we’d like to talk about a study that covers what happens when a data breach occurs. Ponemon Institute is an organization that researches data protection,…
Read article

Cybersecurity New Year’s Resolutions For 2018

As we enter 2018 with fresh outlooks and new projects to look forward to, it’s important to keep IT services at the forefront. With as much cyber attack, ransomware, and other threats going around, you should take any and all necessary steps in protecting your company. How prepared are you for disaster recovery? Do you have a plan in place?…
Read article

Minimize Downtime | Be Proactive in Prevention

Today, with as much digital information being passed through both the cloud and devices, the threat of tech failure is at an all time high. Coupled with the threat of tech failure comes the threat of the downtime that follows, while things are being patched. You can have a concrete disaster recovery plan in place, and still end up with…
Read article