Lutrum LLC

Blog

Blog 1 - How small businesses can go big on cybersecurity

Cybercrime - Two basic routines to Protect Your Data Cybersecurity is certainly not something to be ignored by organizations no matter how big or small they may be in terms of client base, staff or sales ...

Healthcare Data Breach Exposes 1.3 Million Patients

Do you make use of the "MyChart" portal to refill prescriptions, contact your healthcare providers or make appointments? If so, you should know that recently, the healthcare giant Novant disclosed a data ...

LastPass Has Been Hacked

Using different passwords on every website and storing them in a secure password manager is a standard best practice in data security. It's generally good advice, but what happens when the makers ...

New Tools Available With Kali Linux 2022.3

Do you have the Kali Linux distribution running on one of the machines you own?  If you're not sure what that is, then you almost certainly don't.  Kali is a Linux distro ...

Microsoft Releases PoC Code For MacOS App Sandbox Vulnerability

MacOS features a powerful sandbox restriction that helps keep modern Apple computers safe by limiting how code can run on the system. Unfortunately, no system is bullet proof. There's a way that ...

Lenovo Models Affected By Medium Severity Vulnerabilities

If you own a Lenovo laptop, be aware that researchers at ESET have recently discovered a trio of bugs reported to Lenovo that could allow an attacker to disable security features and ...

Microsoft 365 Suggests Rollback After Issues From Update

Does your company use Microsoft 365?  If so, and you've noticed that your Office apps have begun to crash mysteriously and inexplicably, be aware that the latest update (build 15330.20298) is the ...

Blog 4 - WHAT SMBs need to understand about cybersecurity

Why Managed Service may be the way to go for your data security Since effective cybersecurity should be a proactive effort, not reactive, this means that SMBs tend to overlook the entire issue as something that ...

IoT Security With Microsoft Defender

The Internet of Things (IoT) has seen explosive growth in recent years. If you like, you can now build your own smart home with intelligent toasters, washing machines, dishwashers, and refrigerators. They ...

Hackers Use VoIP Systems To Install PHP Web Shells

Security researchers at Unit 42, a division of Palo Alto Networks, have been tracking the efforts of a massive campaign aimed at Elastix VoIP telephony servers. They are used by companies of ...

Latest Articles

VoIP Features Enhance Customer Experience

VoIP Features Enhance Customer Experience

There are many reasons why staff may be required to put customers on hold. However, Voice-over Internet Protocol (VoIP) technology...
The Rise of Encryption in Businesses

The Rise of Encryption in Businesses

As our world becomes increasingly digitized, businesses are finding themselves at a greater risk of cyberattacks. One way companies can...
Hundreds of U.S. News Outlets Affected by Malware

Hundreds of U.S. News Outlets Affected by Malware

A cyber-security threat actor known as SocGholish has compromised a JavaScript code used by an unnamed media content provider. The...

Locations

Chandler (HQ)

3150 N. Arizona Ave. Suite 112
Chandler, AZ 85225
(844) 644-4600

Houston

2100 West Loop South, Suite 900
Houston,TX 77027
(844) 644-4600

Broomfield

390 Interlocken Crescent, Suite 350
Broomfield, CO 80021
(844) 644-4600

Indianapolis

7934 Zionsville Rd
Indianapolis IN 46268
(844) 644-4600

Plano

6600 Chase Oaks Blvd
Suite 100
Plano, TX 75023
(844) 644-4600

Company

Since 2010, Lutrum has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in the Phoenix, Houston, and Denver areas. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite