<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">

Recent Posts

Malicious Wallpapers, Phishing Trends, Zoom Backgrounds & more!

More Apple Store Drama, Ransomware Wins and the New Facebook

Apple Gave Epic a fortnight, Influencer Resilience & Reeling in TikTok

We have joined the ASCII Group community!

TikTok Ban, Chex Quest Revamp and Unilever Experiments

Timelapse of Elmore Bridge Construction!

Twitter stops Tweets & Hulu offers Sweets

Phishing the Fisherman, Chrome's URL, & Reddit/Pinterest's show time

Lightbulbs hearing you, FB email marketing, & the 'Lock-down Whopper'

Flaws in Apple sign-in, Upgrading to Android 10, and Core Web Vitals

How has COVID-19 influenced security and changed our marketing efforts

Establishing a New Norm - The Lighthouse IT Podcast

Making Use of the Downtime

Planning for the Remote Workforce

Introducing a Revolutionary Solution for Better Cyber Security

Electronic Funds Transfer (EFT) Scams

Could Multi-factor Authentication really be that good?

Urgent/11 and You

Cybersecurity Needs to Be Everywhere

Cybersecurity Does Not Need to Be Scary!

The Importance of Cybersecurity

What makes a good website?

Best way for employees to communicate internally

Windows 7 End of Life

What is a Network Switch?

6 Ways We Shield Your Business From Ransomware

Is a website redesign enough to get you to the top of Google?

Why should your website be mobile friendly?

Inside Secure-IT: Network Security and Device Protection

Inside Secure-IT: User-Based Security and Password Management

Inside Secure-IT: Physical Security

Inside Secure-IT: Backups and Recovery

How to reduce a computer's boot time

Clearing your browser cache

What to think about before hiring an IT professional?

Is it better to have a little SaaS?

Striving to be Indispensable in Our Community

A Lesson in Shattering Expectations

Should I Outsource My IT?

What is a pop-up and how can I get rid of them?

What is a Rootkit?

Spam Emails and Getting Rid of Them

The Different Types of Malware

What should I do about a "Low Disk Space" error?

Online Gaming Risks and Warnings

Cloud-to-Cloud Backup - Safer, smarter and more secure

What are HTTP Cookies and why can't I eat them...?

What if everything you do was being watched?

What is Air-Gapped Security?

The Ultimate Disaster Recovery Checklist

Trojans and Adware, the Vessels of Malware

Internet Safety for Children

Computer Viruses, The Most Notable Malware

Computer Worms

What is Malware?

How secure is your network?

Ransomware and How to Protect Your Organization...

What is Phishing and how can you protect yourselves against it?

Small Business Passwords and Policies with Online Security

Building a Network - Starting from Scratch

How often should business computers be upgraded?

The Bug Everyone’s Talking About - The Intel Bug

Monitoring your Network

Identifying Computer Display Connectors

So Long 2017 & Thanks for all the Fish!

Stroke Life Center - Northwestern Ohio

What is the Difference Between Memory and Storage?

Keep SSL in mind - Holiday shopping done right!

Why Documentation Can Streamline Any Business

Should I get my staff more training?

Creating And Maintaining A Successful Network

What it is like working for an IT Company in Elmore, Ohio?

What is RAM and how does my computer use it?

Digital Signage: Advertise & Inform, Instantly

The Clutter Folder

Voice as an Application: Why is it time to think VoIP?

The importance of using a ticketing system.

What's a Network Risk Assessment & why should I get one?

Why do Businesses Use Office 365?

Backups & Business Continuity. What’s the difference?

Harmony with Collaboration & Communication Tools in Office 365

Navigate Training - Continuing Education for Staff

Why is a VoIP phone better than traditional Analog phone systems?

IT Managed Service. What is it & do I need one?

What's so scary about a POODLE?