Articles
Perspectives on the technology
shaping modern business.
News, analysis, and commentary for business leaders navigating a changing technology landscape.
Latest Article
AI Isn’t Taking Your Job Any Time Soon
April 27, 2026
If you’ve spent any time on LinkedIn or in a business magazine over the past year, you’ve been told that AI is about to do your job. Maybe it’s already replacing the person next to you. Maybe you’re next. The pitch has gotten so loud that even people who know better are starting to believe it. Here’s the thing: the research coming out of the…

AI Isn’t Taking Your Job Any Time Soon
April 27, 2026
If you’ve spent any time on LinkedIn or in a business magazine over the past year, you’ve been told that AI is about to do your job. Maybe it’s already replacing the person next to…

Zero Tolerance for CSAM
March 2, 2026
This month, we published a formal policy on how Lumitiv handles any discovery of child sexual abuse material (CSAM) during the course of our work. The full document is available here, but the short version…

How a Compromised Mailbox Can Damage Customer Trust
January 15, 2026
A recent incident highlights a risk many businesses do not recognize until after customers are affected. A Calgary based organization experienced an email account compromise that resulted in malicious messages being sent to customers and…

Why Business IT Hardware Costs Are Rising
November 25, 2025
Hardware costs have climbed across every category that businesses rely on, from servers to laptops to desktop systems. Many organizations assume this trend is tied to tariffs, inflation, or lingering supply chain problems. Those factors…

Should You Be Buying Vendor Warranties on Every Device?
September 1, 2025
When you’re buying new laptops, desktops, or other end-user devices, you’ll almost always be asked if you want to add a warranty service contract. The pitch sounds reasonable: “Protect your investment. Guaranteed repairs. Peace of…

Business Internet in Calgary: More Choices
August 25, 2025
When Calgary businesses start looking for internet service, the search often begins with Telus or Rogers. These are the two most visible providers, and their marketing makes them seem like the only real options. In…

Time to Rethink Remote Access?
August 18, 2025
Yet another security flaw in SSL VPN technology has made headlines, and it’s raising an important question: is the traditional VPN model still the right fit for most businesses? For years, SSL VPNs built into…

Are IT Companies Forgetting the Basics of Security?
August 13, 2025
If your IT company has ever walked you through a slide deck full of vendor logos — endpoint protection, SIEM, EDR, dark web monitoring, threat intelligence feeds — and you came away thinking you were…

Abuse of Trusted Platforms: A Case Study on Trello Invite Email Payloads
July 23, 2025
An end user recently received an email that looked completely legitimate on the surface. It invited them to join a Trello board and appeared to come from a known sender within their own company. The…

CodeTwo Email Signatures and Why We Use It
March 31, 2025
CodeTwo Email Signatures 365 is a centralized system for managing email signatures, disclaimers, auto-replies, and marketing banners across Microsoft 365 environments. It is the only solution of its kind certified by Microsoft and used by…

Why You Should Block DeepSeek and Build a Safer AI Strategy
March 20, 2025
AI platforms are changing the way businesses operate, but not all AI tools meet basic security expectations. DeepSeek AI has emerged as a significant risk for organizations concerned with data privacy and regulatory compliance. The…

Password Managers: Can They Be Hacked?
February 6, 2025
In our everyday digital interactions, securing our online presence is more critical than ever. Password managers have emerged as key tools in this endeavor, promising to safeguard our numerous passwords with a single master key.…
