<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
 

Mark Nash

Picture of

Recent Posts

Cyber Security Awareness

Posted by Mark Nash on Oct 27, 2020 9:00:00 AM

Over these past few weeks of this year's National Cybersecurity Awareness Month (NCSAM) we have mentioned several times how one of the most important aspects of being cyber secure is being aware of potential dangers. So, it is high time that we discuss how you can go about identifying dangers and keeping yourself up to date with the latest cyber security knowledge. 

Awareness

One of the first things you should know is how to protect yourself from is phishing scams. We have an entire blog post dedicated to this subject here, but the short version is that phishing scams are when a malicious website or email tries to trick you into thinking it is legitimate and allowing it to steal your data or infect your devices. The most important things to know from this is to always scrutinize any emails that ask for your data, to follow a link, or download a file. You should always check the sender’s address to see if it is actually from who it is claiming to be. Additionally, you should find the phone number of the person or organization the email claims to be sent from and call them personally to verify the validity of the email, if the email provides you with a phone number you should verify it with research such as comparing it to the phone number on a known legitimate site before trusting it.

Read More

Topics: Network Risk Assessment, Managed Service Provider, Internet Safety, NCSAM, Cybersecurity

Cyber Security Essentials

Posted by Mark Nash on Oct 23, 2020 11:00:00 AM

Continuing the discussion on cyber security during this year's National Cybersecurity Awareness Month (NCSAM), we will be talking about the Cybersecurity and Infrastructure Security Agency’s (CISA) list of cyber security essentials.

There are three specific actions that CISA recommends all people take. 

1. Backup your data

First of these actions is to make and keep regular backups of your data. In the unfortunate event of a device malfunction or if a malware attack renders your data inaccessible, having backups can change the scenario from disastrous to inconvenient. You can read more about backups here.

Read More

Topics: Network Risk Assessment, Internet Safety, Backups, NCSAM, Cybersecurity, Multi-factor Authentication

Cyber Security While Shopping Online

Posted by Mark Nash on Oct 13, 2020 4:00:00 PM

Even since the early days of the internet people have seen the potential of being able to make purchases for just about anything from the comfort of their own homes. Online shopping means that you do not have to deal with traffic, crowds, or even having to transport your purchases. However, despite the benefits of online shopping, it carries its fair share of risks. Just as with any virtual service, online shopping is often targeted by hackers who want to steal personal data and money. Although these risks exist that does not mean that you should never do any shopping online, as long as you keep safety in mind and follow good practices then the risks can be greatly mitigated. There are three primary methods that hackers use in order to steal data from online shopping transactions. 

1. Phishing

The first of these is by phishing, which is the use of fraudulent websites or emails posing as legitimate ones. Common forms of this are when a cyber-criminal makes a fraudulent website that looks just like the legitimate version of an ecommerce website, and attempts to trick the user into making a purchase through this fraudulent site thereby inadvertently giving the cyber-criminal the users data when they attempt to complete the transaction. Additionally, when a cyber-criminal creates a fraudulent email designed to look like it is coming from a legitimate source, often asking the user to follow a link to a fraudulent website to “confirm some information about a purchase the user made,” although in reality this is just an attempt to get the user to give up their information to the cyber-criminal. The best way to prevent falling victim to this sort of scam is to stay cautious and pay close attention. When performing online shopping only use reputable vendors, and always check the address bar of the site that you are shopping on to make sure that it is what it should be. Additionally, always check the sender address of any emails you receive to ensure that they are actually coming from who they say they are, and if the email asks you to follow a link hover over the link and wait for the text box to appear showing you where the link actually leads to so you can determine if you should actually click on it. 

Read More

Topics: IT services, Internet Safety, NCSAM, Ransomware, Malware

National Cybersecurity Awareness Month - 2020

Posted by Mark Nash on Oct 7, 2020 9:29:11 AM

We have made it to October and the finish line for 2020 is getting close.

While most people associate October with a spooky atmosphere and delicious pumpkin spice, it is also National Cybersecurity Awareness Month (NCSAM). Here at Lighthouse IT, we hold this month very close to our hearts. It is the most important month to our industry because the web is flooded with both people and businesses alike, taking initiative in their cybersecurity. This being the 17th year of NCSAM, promoting the importance of cyber security and education is imperative as it can very easily make or break a business. Lighthouse IT Solutions will be following along and posting a new blog every week this month to help bring awareness regarding cyber security. 

By the way, if you are curious about just how serious cyber security should be taken, check out Datto’s Global State of the Channel
Ransomware Report. In this PDF, there is a plethora of cited statistics to reinforce our concerns that business are not being cyber-safe.

Read More