Lumitiv Technology Blog

Understanding technology shouldn’t require a degree in rocket science. Our mission is to break down complex IT concepts into clear, manageable solutions that help your business thrive.
Lenovo Partner
Microsoft Partner
Cisco Partner
Poly Partner
HP Partner
Dialpad Partner

Latest Article

Zero Tolerance for CSAM

March 2, 2026

Reading time: 2 minutes

Calgary, Alberta – March 3, 2026 – Lumitiv, a leading Calgary-based managed IT services provider with over 16 years of experience delivering comprehensive IT support, cybersecurity, and managed services to businesses across Canada and the United States, today announced the formal adoption and publication of its Zero Tolerance for Child Exploitation: Our CSAM and Reporting Policy To our clients, partners, and industry colleagues, Child sexual…

  • Zero Tolerance for CSAM

    March 2, 2026

    Calgary, Alberta – March 3, 2026 – Lumitiv, a leading Calgary-based managed IT services provider with over 16 years of experience delivering comprehensive IT support, cybersecurity, and managed services to businesses across Canada and the…

  • How a Compromised Mailbox Can Damage Customer Trust

    January 15, 2026

    A recent incident highlights a risk many businesses do not recognize until after customers are affected. A Calgary based organization experienced an email account compromise that resulted in malicious messages being sent to customers and…

  • Why Business IT Hardware Costs Are Rising

    November 25, 2025

    Hardware costs have climbed across every category that businesses rely on, from servers to laptops to desktop systems. Many organizations assume this trend is tied to tariffs, inflation, or lingering supply chain problems. Those factors…

  • Should You Be Buying Vendor Warranties on Every Device?

    September 1, 2025

    When you’re buying new laptops, desktops, or other end-user devices, you’ll almost always be asked if you want to add a warranty service contract. The pitch sounds reasonable: “Protect your investment. Guaranteed repairs. Peace of…

  • Business Internet in Calgary: More Choices

    August 25, 2025

    When Calgary businesses start looking for internet service, the search often begins with Telus or Rogers. These are the two most visible providers, and their marketing makes them seem like the only real options. In…

  • Time to Rethink Remote Access?

    August 18, 2025

    Yet another security flaw in SSL VPN technology has made headlines, and it’s raising an important question: is the traditional VPN model still the right fit for most businesses? For years, SSL VPNs built into…

  • Are IT Companies Forgetting the Basics of Security?

    August 13, 2025

    A hard question has been surfacing: Are IT companies still focused on the fundamentals of security, or is the conversation now dominated by who has the flashiest stack of tools to brag about at a…

  • Abuse of Trusted Platforms: A Case Study on Trello Invite Email Payloads

    July 23, 2025

    An end user recently received an email that looked completely legitimate on the surface. It invited them to join a Trello board and appeared to come from a known sender within their own company. The…

  • CodeTwo Email Signatures and Why We Use It

    March 31, 2025

    CodeTwo Email Signatures 365 is a centralized system for managing email signatures, disclaimers, auto-replies, and marketing banners across Microsoft 365 environments. It is the only solution of its kind certified by Microsoft and used by…

  • Why You Should Block DeepSeek and Build a Safer AI Strategy

    March 20, 2025

    AI platforms are changing the way businesses operate, but not all AI tools meet basic security expectations. DeepSeek AI has emerged as a significant risk for organizations concerned with data privacy and regulatory compliance. The…

  • Password Managers: Can They Be Hacked?

    February 6, 2025

    In our everyday digital interactions, securing our online presence is more critical than ever. Password managers have emerged as key tools in this endeavor, promising to safeguard our numerous passwords with a single master key.…

  • The Future of Network Security: Zero Trust VPN

    January 18, 2025

    Traditional VPN solutions, such as Microsoft VPN or OpenVPN, have served their purpose but are now inadequate in the face of increasingly sophisticated cyber threats. Zero Trust Networks introduce a robust, modern security framework that…