Lumitiv Technology Blog

Understanding technology shouldn’t require a degree in rocket science. Our mission is to break down complex IT concepts into clear, manageable solutions that help your business thrive.
Lenovo Partner
Microsoft Partner
Cisco Partner
Poly Partner
HP Partner
Dialpad Partner

Latest Article

Should You Be Buying Vendor Warranties on Every Device?

September 1, 2025

Reading time: 3 minutes

When you’re buying new laptops, desktops, or other end-user devices, you’ll almost always be asked if you want to add a warranty service contract. The pitch sounds reasonable: “Protect your investment. Guaranteed repairs. Peace of mind.” The problem? In many cases, the math doesn’t add up, especially if you’re buying from a reputable brand like Lenovo where failure rates are already low. And there’s often…

  • Should You Be Buying Vendor Warranties on Every Device?

    September 1, 2025

    When you’re buying new laptops, desktops, or other end-user devices, you’ll almost always be asked if you want to add a warranty service contract. The pitch sounds reasonable: “Protect your investment. Guaranteed repairs. Peace of…

  • Business Internet in Calgary: More Choices

    August 25, 2025

    When Calgary businesses start looking for internet service, the search often begins with Telus or Rogers. These are the two most visible providers, and their marketing makes them seem like the only real options. In…

  • Time to Rethink Remote Access?

    August 18, 2025

    Yet another security flaw in SSL VPN technology has made headlines, and it’s raising an important question: is the traditional VPN model still the right fit for most businesses? For years, SSL VPNs built into…

  • Are IT Companies Forgetting the Basics of Security?

    August 13, 2025

    A hard question has been surfacing: Are IT companies still focused on the fundamentals of security, or is the conversation now dominated by who has the flashiest stack of tools to brag about at a…

  • Abuse of Trusted Platforms: A Case Study on Trello Invite Email Payloads

    July 23, 2025

    An end user recently received an email that looked completely legitimate on the surface. It invited them to join a Trello board and appeared to come from a known sender within their own company. The…

  • CodeTwo Email Signatures and Why We Use It

    March 31, 2025

    CodeTwo Email Signatures 365 is a centralized system for managing email signatures, disclaimers, auto-replies, and marketing banners across Microsoft 365 environments. It is the only solution of its kind certified by Microsoft and used by…

  • Why You Should Block DeepSeek and Build a Safer AI Strategy

    March 20, 2025

    AI platforms are changing the way businesses operate, but not all AI tools meet basic security expectations. DeepSeek AI has emerged as a significant risk for organizations concerned with data privacy and regulatory compliance. The…

  • Password Managers: Can They Be Hacked?

    February 6, 2025

    In our everyday digital interactions, securing our online presence is more critical than ever. Password managers have emerged as key tools in this endeavor, promising to safeguard our numerous passwords with a single master key.…

  • The Future of Network Security: Zero Trust VPN

    January 18, 2025

    Traditional VPN solutions, such as Microsoft VPN or OpenVPN, have served their purpose but are now inadequate in the face of increasingly sophisticated cyber threats. Zero Trust Networks introduce a robust, modern security framework that…

  • We’ve Gone Dark: Easier on Your Eyes, Better for You

    November 26, 2024

    Lumitiv, your all-in-one IT department, is excited to announce the launch of our newly redesigned website featuring a sleek dark theme. This transformation aligns with our commitment to simplify technology while prioritizing the well-being of…

  • Critical Security Flaws Found in NVIDIA GeForce GPUs

    November 5, 2024

    NVIDIA has issued an urgent warning to all users of its GeForce GPUs after discovering multiple high-severity vulnerabilities in its GPU drivers and software. These security flaws could allow attackers to gain full access to…

  • KnowBe4 Fake IT Worker

    KnowBe4 Hires Fake North Korean IT Worker

    July 25, 2024

    KnowBe4 is a prominent cybersecurity awareness training platform founded by Stu Sjouwerman in Florida, specializing in educating employees about the threats posed by cybercriminals, including advanced persistent threats, social engineering tactics, and insider threats. Through…