
How to Recognize and Avoid Phishing Scams
By Michael Hensley, Director of Professional Services As cyberattacks have become increasingly prevalent in recent years, the importance of effective cybersecurity preparation has grown exponentially. To safeguard assets and protect against hacking attempts, organizations have felt the pressing need to ramp-up their security measures by mandating appropriate training exercises and informational sessions for all employees. Despite recent technological innovations that…
Read article

IT Protection Checklist: Staying Cyber-Secure When Returning to Work
By Michael Hensley, Director of Professional Services As our communities have begun taking significant strides in easing shutdown restrictions and entering new phases of reopening, many businesses have begun to follow suit. While the number of COVID-19 cases continues to drop nationwide, our nation’s economy has surged in recent weeks as restaurants, retail stores, hair salons, and other small businesses…
Read article

Video: How to Solve Cybersecurity Challenges During COVID-19
As the COVID-19 crisis continues to evolve, we are making every effort to help your business stay safe from cyberthreats and other IT challenges. We teamed up with our trusted partners at Cyberstone to put together this informational video, which covers: Hacking campaigns and phishing attacks Trickbot banking trojans Tips from the National Cyber Security Center Virtual Private Networks (VPN)…
Read article

3 Cybersecurity Tips for Business Contuinity
As the COVID-19 situation continues to unfold globally, cybersecurity has never been more important for businesses in all industries. COVID-19-themed hacking campaigns and phishing attacks are on the rise, and many employers are telling their employees to work from home. Companies need to take the proper precautions to maintain business continuity. At Lume Strategies, we want to make sure companies…
Read article

4 Reasons to Employ Remote Monitoring and Management
As your partners in holistic IT solutions, our top priority is effectively managing your network and technology assets to keep them safe and optimized so you stay productive. To do this, we leverage Datto Remote Monitoring and Management (RMM) to manage and protect your business. We use this platform to deliver premier monitoring and management services of your technology assets,…
Read article

5 Answers to Cybersecurity in the Workplace
A couple weeks ago, we told you about the five can’t-miss events at the NY Tech Summit. Today, we’re recapping one of those five things: Mike Hensley’s speech about why small businesses are prone to cyberattacks. Here’s what our Senior Manager of IT Solutions had to say. Why are small businesses at risk? Most small businesses conduct their business online,…
Read article

5 Can’t-Miss Events at the NY Tech Summit
Heading to the NY Tech Summit at the Turning Stone Casino on Wednesday, June 5? If not, we hope you’ll consider joining us. For those of you who’ll be in attednance, here’s what to look out for (other than the slots, shows, and gaming tables). 1. Keynote Speaker: Merril Hoge “Who is Merril Hoge?” “WHO IS MERRIL HOGE?!” He’s…
Read article

4 Key Takeaways from the New NIST Cybersecurity Framework
Last year, the National Institute of Standards and Technology (NIST) updated its cybersecurity framework, an industry-best outline for how to improve the security and resilience of your IT infrastructure. It’s a complex document, so we put together this quick list of key takeaways. 1. The framework is designed to help you: Describe your current cybersecurity posture Identify your target state…
Read article

Data Privacy vs. Data Protection: What’s the Difference?
Ever hear the expression, “I don’t make the rules; I only enforce them”? It operates on the premise that two separate entities work in tandem to achieve the same desired result. We’ve seen it a hundred times: The policeman doesn’t write the traffic laws; he just gives you the ticket. The referee doesn’t write the hockey rules; she just puts…
Read article

Implementing the NIST Cybersecurity Framework—Why and How?
At the 18th Annual Niagara County Technology and Cybersecurity Forum, Lume Strategies Chief Information Officer Peter Capelli spoke about steps organizations can take to enhance their cybersecurity programs. In particular, he shared his expertise on the NIST Cybersecurity Framework, which was first released in 2014 and recently updated in 2018. What is the NIST Cybersecurity Framework? Congress established the National…
Read article