<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
  •  
  •  
 

Mark Nash

Picture of

Recent Posts

Cyber Security While Shopping Online

Posted by Mark Nash on Oct 13, 2020 4:00:00 PM

Even since the early days of the internet people have seen the potential of being able to make purchases for just about anything from the comfort of their own homes. Online shopping means that you do not have to deal with traffic, crowds, or even having to transport your purchases. However, despite the benefits of online shopping, it carries its fair share of risks. Just as with any virtual service, online shopping is often targeted by hackers who want to steal personal data and money. Although these risks exist that does not mean that you should never do any shopping online, as long as you keep safety in mind and follow good practices then the risks can be greatly mitigated. There are three primary methods that hackers use in order to steal data from online shopping transactions. 

1. Phishing

The first of these is by phishing, which is the use of fraudulent websites or emails posing as legitimate ones. Common forms of this are when a cyber-criminal makes a fraudulent website that looks just like the legitimate version of an ecommerce website, and attempts to trick the user into making a purchase through this fraudulent site thereby inadvertently giving the cyber-criminal the users data when they attempt to complete the transaction. Additionally, when a cyber-criminal creates a fraudulent email designed to look like it is coming from a legitimate source, often asking the user to follow a link to a fraudulent website to “confirm some information about a purchase the user made,” although in reality this is just an attempt to get the user to give up their information to the cyber-criminal. The best way to prevent falling victim to this sort of scam is to stay cautious and pay close attention. When performing online shopping only use reputable vendors, and always check the address bar of the site that you are shopping on to make sure that it is what it should be. Additionally, always check the sender address of any emails you receive to ensure that they are actually coming from who they say they are, and if the email asks you to follow a link hover over the link and wait for the text box to appear showing you where the link actually leads to so you can determine if you should actually click on it. 

Read More

Topics: IT services, Internet Safety, NCSAM, Ransomware, Malware

National Cybersecurity Awareness Month - 2020

Posted by Mark Nash on Oct 7, 2020 9:29:11 AM

We have made it to October and the finish line for 2020 is getting close.

While most people associate October with a spooky atmosphere and delicious pumpkin spice, it is also National Cybersecurity Awareness Month (NCSAM). Here at Lighthouse IT, we hold this month very close to our hearts. It is the most important month to our industry because the web is flooded with both people and businesses alike, taking initiative in their cybersecurity. This being the 17th year of NCSAM, promoting the importance of cyber security and education is imperative as it can very easily make or break a business. Lighthouse IT Solutions will be following along and posting a new blog every week this month to help bring awareness regarding cyber security. 

By the way, if you are curious about just how serious cyber security should be taken, check out Datto’s Global State of the Channel
Ransomware Report. In this PDF, there is a plethora of cited statistics to reinforce our concerns that business are not being cyber-safe.

Read More

Making Use of the Downtime

Posted by Mark Nash on Apr 11, 2020 2:00:00 PM

Productive tasks to help your business grow during your spare time.

As we begin to enter the warmer seasons, it is natural that small businesses will find their level of activity marginally lower, especially so this year with the COVID-19 virus keeping everyone indoors. While this potential decrease in revenue can be unsettling, the increase in free time can be put to good use. Now is your chance to take an introspective look at the business.

What can be improved, strengthened, or changed?  

DIGITAL SECURITY 

The best place to start is by reviewing your business’s digital security. You should review all the security systems that your company has set up and determine how capable they are of protecting your business and its data. Talk with your employees and make sure that they are aware of what is required of them to keep the business protected. A large part of security is having a plan to mitigate damage and the appropriate follow up in the unfortunate event that your business is the victim of a cyber-attack. Check out Navigate Defense if you want tools to enhance your workforce.

Read More

Topics: Navigate Training, Continued education, Momentum Marketing, Website Development, SEO, Cybersecurity, COVID19, Remote Workforce, Downtime

Introducing a Revolutionary Solution for Better Cyber Security

Posted by Mark Nash on Mar 6, 2020 11:00:00 AM

Cyber security is a vital component of any company, no matter the size or what products/services they provide. Cyber security is important for every business and individual. While antivirus and firewalls are a good start, they cannot protect a business from all the digital threats it will face. As the already massive and turbulent nature of the digital space continues to expand, cyber security needs to keep up with it. In order to provide a greater presence Lighthouse IT Solutions is happy to announce that it has partnered with Defendify to make Cyber Security easy to understand and implement.

Defendify is an all-in-one cyber security platform that has been specifically designed for small businesses. It focuses on creating a strong foundation to foster a culture of security within a company and uses its own technologies to expand a company’s existing cyber security setup.

To ensure that businesses have supporting infrastructure, Defendify:

  • helps create policies and rules to regulate the use of technology and data with cyber security in mind
  • helps create response plans that can be quickly deployed to protect the business as much as possible in the event of a cyber-attack
  • provides regular cyber security health checkups informing businesses of the vulnerability of their cyber security measures and where they can improve
  • employs the use of ethical hackers to simulate cyber-attacks and identify any weaknesses so that they can be strengthened
Read More

Topics: Navigate Training, Internet Safety, Ransomware, Cybersecurity, Multi-factor Authentication, Malware