Latest Article
Should You Be Buying Vendor Warranties on Every Device?
When you’re buying new laptops, desktops, or other end-user devices, you’ll almost always be asked if you want to add a warranty service contract. The pitch sounds reasonable: “Protect your investment. Guaranteed repairs. Peace of mind.” The problem? In many cases, the math doesn’t add up, especially if you’re buying from a reputable brand like Lenovo where failure rates are already low. And there’s often…
Should You Be Buying Vendor Warranties on Every Device?
September 1, 2025
When you’re buying new laptops, desktops, or other end-user devices, you’ll almost always be asked if you want to add a warranty service contract. The pitch sounds reasonable: “Protect your investment. Guaranteed repairs. Peace of…
Business Internet in Calgary: More Choices
August 25, 2025
When Calgary businesses start looking for internet service, the search often begins with Telus or Rogers. These are the two most visible providers, and their marketing makes them seem like the only real options. In…
Time to Rethink Remote Access?
August 18, 2025
Yet another security flaw in SSL VPN technology has made headlines, and it’s raising an important question: is the traditional VPN model still the right fit for most businesses? For years, SSL VPNs built into…
Are IT Companies Forgetting the Basics of Security?
A hard question has been surfacing: Are IT companies still focused on the fundamentals of security, or is the conversation now dominated by who has the flashiest stack of tools to brag about at a…
Abuse of Trusted Platforms: A Case Study on Trello Invite Email Payloads
July 23, 2025
An end user recently received an email that looked completely legitimate on the surface. It invited them to join a Trello board and appeared to come from a known sender within their own company. The…
CodeTwo Email Signatures and Why We Use It
March 31, 2025
CodeTwo Email Signatures 365 is a centralized system for managing email signatures, disclaimers, auto-replies, and marketing banners across Microsoft 365 environments. It is the only solution of its kind certified by Microsoft and used by…
Why You Should Block DeepSeek and Build a Safer AI Strategy
March 20, 2025
AI platforms are changing the way businesses operate, but not all AI tools meet basic security expectations. DeepSeek AI has emerged as a significant risk for organizations concerned with data privacy and regulatory compliance. The…
Password Managers: Can They Be Hacked?
February 6, 2025
In our everyday digital interactions, securing our online presence is more critical than ever. Password managers have emerged as key tools in this endeavor, promising to safeguard our numerous passwords with a single master key.…
The Future of Network Security: Zero Trust VPN
January 18, 2025
Traditional VPN solutions, such as Microsoft VPN or OpenVPN, have served their purpose but are now inadequate in the face of increasingly sophisticated cyber threats. Zero Trust Networks introduce a robust, modern security framework that…
We’ve Gone Dark: Easier on Your Eyes, Better for You
November 26, 2024
Lumitiv, your all-in-one IT department, is excited to announce the launch of our newly redesigned website featuring a sleek dark theme. This transformation aligns with our commitment to simplify technology while prioritizing the well-being of…
Critical Security Flaws Found in NVIDIA GeForce GPUs
November 5, 2024
NVIDIA has issued an urgent warning to all users of its GeForce GPUs after discovering multiple high-severity vulnerabilities in its GPU drivers and software. These security flaws could allow attackers to gain full access to…
KnowBe4 Hires Fake North Korean IT Worker
July 25, 2024
KnowBe4 is a prominent cybersecurity awareness training platform founded by Stu Sjouwerman in Florida, specializing in educating employees about the threats posed by cybercriminals, including advanced persistent threats, social engineering tactics, and insider threats. Through…