Latest Article
Time to Rethink Remote Access?
Yet another security flaw in SSL VPN technology has made headlines, and it’s raising an important question: is the traditional VPN model still the right fit for most businesses? For years, SSL VPNs built into firewalls from vendors like SonicWall, Fortinet, and others have been a common way to give remote workers secure access to internal systems. They’ve worked — most of the time —…

How Often Should You Change Your Password?
May 15, 2023
Securing online networks is a critical task for many organizations, and numerous strategies are in place to strengthen this, such as password updates. So, how frequently should a password change be? Are you still using…

Managed Insight Transforms into Lumitiv
May 4, 2023
CALGARY, Alberta, May 04, 2023 – In celebration of its 13th year in business, Managed Insight, a renowned IT solutions and support provider, is thrilled to unveil its new corporate identity. Now operating under the…

Understanding Starlink Service in Canada
May 1, 2023
What is Starlink? Before we delve into the specifics of Starlink’s Canadian services, it’s crucial to grasp what Starlink is. Starlink, a subsidiary of Elon Musk’s SpaceX, has undertaken a massive project to deliver high-speed, low-latency broadband…

Microsoft 365 Business Standard vs Premium
April 3, 2023
Navigating the world of business technology can feel like you’re lost in a sea of jargon and acronyms. At Lumitiv, we’re here to cut through the noise and offer straightforward guidance to help you make…

What is a Proxy Server?
March 27, 2023
Should your business consider utilizing a proxy server? If boosting your cybersecurity measures, regulating traffic, and optimizing the online experience for clients and employees are on your agenda, a proxy server could be an advantageous…

What is Endpoint Security?
March 20, 2023
In an ever-evolving digital landscape, securing your business network has never been more critical. With an increase in cyber threats and the rising prevalence of remote work, understanding the mechanisms that safeguard your network is…

The Unsweetened Truth About Juice Jacking
March 13, 2023
As we become increasingly interconnected in our global digital landscape, cyber threats have found a way into some of the most unexpected places – including the innocuous-looking USB power charging stations that dot our airports,…

The Misconceptions of Anonymity in VPN Services
Over the past decade, the use of Virtual Private Networks (VPNs) has surged, driven largely by the increasing need for online security and privacy. VPNs have been marketed as the holy grail of online anonymity.…

A Simplified Guide to Upgrading to Windows 11
January 23, 2023
Getting to grips with a new operating system can feel like a daunting task. With the arrival of Windows 11, you may have questions swirling in your mind: How do I upgrade my PC? Do…

A Simple Toolkit for Device Safety While Travelling
Travelling is a thrilling adventure, a journey to new experiences. But when it’s accompanied by the devices that tether us to our digital lives, it can present unique challenges. Among these, security ranks at the…

Why MFA is Important
January 10, 2023
In an era defined by growing cyber threats, safeguarding your digital assets has become more crucial than ever. Multi-factor authentication (MFA) adds an additional layer of security to traditional username-password systems, ensuring your data’s protection.…

What Is a Firewall?
In an increasingly digitized world, cybersecurity has become a major concern for businesses big and small. Recent statistics from ID Agent suggest that nearly half of all businesses reported five or more cyber attacks in…



















