Category:

lume

The Value of IT Outsourcing

The progression of the twenty-first-century tech ecosystem has delivered significant improvements to the way our businesses operate. But in today’s day and age, we all know how stressful and confusing technology can be. Whether you’re looking to establish your organization’s cloud-based presence, troubleshoot your employees’ tech problems, or protect your business from cybersecurity threats, the slew of technological “to-do’s” can…
Read article

Top Technology Trends of 2021

By Michael Hensley, Director of Professional Services Like millions of other people in the world, I’m looking forward to ridding my hands of 2020 and starting fresh in the new year. While the pandemic has left an indisputable mark on our planet, recent advancements in technology have provided much-needed hope and optimism for the future. When looking ahead to the…
Read article

Webinar Highlights: Protecting Your Data in 2020 and Beyond

Data privacy and security are two initiatives that have become top priorities for business and IT leaders around the world in recent years. While maintaining a secure environment is critically important in safeguarding an organization’s private information, the shift to a remote workforce has allowed cybercriminals to cause significant business disruption. For months, hackers have effectively taken advantage of employees’…
Read article

The Importance of Two-Factor Authentication

By Michael Hensley, Director of Professional Services Ready for the eye-opening stat of the day? Since the start of COVID-19, the FBI and its IC3 (Internet Crime Complaint Center) has reported a 300% increase in reported cybercrime activity. This starting rise in the frequency of cyberattacks has prompted companies—especially those with vulnerable networks due to increases in work-from-home activity—to enhance…
Read article

Video: How to Solve Cybersecurity Challenges During COVID-19

As the COVID-19 crisis continues to evolve, we are making every effort to help your business stay safe from cyberthreats and other IT challenges. We teamed up with our trusted partners at Cyberstone to put together this informational video, which covers: Hacking campaigns and phishing attacks Trickbot banking trojans Tips from the National Cyber Security Center Virtual Private Networks (VPN)…
Read article

3 Cybersecurity Tips for Business Contuinity

As the COVID-19 situation continues to unfold globally, cybersecurity has never been more important for businesses in all industries. COVID-19-themed hacking campaigns and phishing attacks are on the rise, and many employers are telling their employees to work from home. Companies need to take the proper precautions to maintain business continuity. At Lume Strategies, we want to make sure companies…
Read article

5 Ways to Prepare for the Windows 10 Update

Microsoft has announced that it will stop supporting Windows 7 after January 14, 2020, which means it will no longer provide tech support, software updates, or security updates to Windows 7 PC users. If you plan on using Windows 7 on your PC after this date, your computer will still work, “but it may become more vulnerable to security risks…
Read article

5 Answers to Cybersecurity in the Workplace

A couple weeks ago, we told you about the five can’t-miss events at the NY Tech Summit. Today, we’re recapping one of those five things: Mike Hensley’s speech about why small businesses are prone to cyberattacks. Here’s what our Senior Manager of IT Solutions had to say. Why are small businesses at risk? Most small businesses conduct their business online,…
Read article

4 Key Takeaways from the New NIST Cybersecurity Framework

Last year, the National Institute of Standards and Technology (NIST) updated its cybersecurity framework, an industry-best outline for how to improve the security and resilience of your IT infrastructure. It’s a complex document, so we put together this quick list of key takeaways. 1. The framework is designed to help you: Describe your current cybersecurity posture Identify your target state…
Read article