<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
  •  
  •  
 

Mark Nash

Picture of

Recent Posts

Making Use of the Downtime

Posted by Mark Nash on Apr 11, 2020 2:00:00 PM

Productive tasks to help your business grow during your spare time.

As we begin to enter the warmer seasons, it is natural that small businesses will find their level of activity marginally lower, especially so this year with the COVID-19 virus keeping everyone indoors. While this potential decrease in revenue can be unsettling, the increase in free time can be put to good use. Now is your chance to take an introspective look at the business.

What can be improved, strengthened, or changed?  

DIGITAL SECURITY 

The best place to start is by reviewing your business’s digital security. You should review all the security systems that your company has set up and determine how capable they are of protecting your business and its data. Talk with your employees and make sure that they are aware of what is required of them to keep the business protected. A large part of security is having a plan to mitigate damage and the appropriate follow up in the unfortunate event that your business is the victim of a cyber-attack. Check out Navigate Defense if you want tools to enhance your workforce.

Read More

Topics: Navigate Training, Continued education, Momentum Marketing, Website Development, SEO, Cybersecurity, COVID19, Remote Workforce, Downtime

Introducing a Revolutionary Solution for Better Cyber Security

Posted by Mark Nash on Mar 6, 2020 11:00:00 AM

Cyber security is a vital component of any company, no matter the size or what products/services they provide. Cyber security is important for every business and individual. While antivirus and firewalls are a good start, they cannot protect a business from all the digital threats it will face. As the already massive and turbulent nature of the digital space continues to expand, cyber security needs to keep up with it. In order to provide a greater presence Lighthouse IT Solutions is happy to announce that it has partnered with Defendify to make Cyber Security easy to understand and implement.

Defendify is an all-in-one cyber security platform that has been specifically designed for small businesses. It focuses on creating a strong foundation to foster a culture of security within a company and uses its own technologies to expand a company’s existing cyber security setup.

To ensure that businesses have supporting infrastructure, Defendify:

  • helps create policies and rules to regulate the use of technology and data with cyber security in mind
  • helps create response plans that can be quickly deployed to protect the business as much as possible in the event of a cyber-attack
  • provides regular cyber security health checkups informing businesses of the vulnerability of their cyber security measures and where they can improve
  • employs the use of ethical hackers to simulate cyber-attacks and identify any weaknesses so that they can be strengthened
Read More

Topics: Navigate Training, Internet Safety, Ransomware, Cybersecurity, Multi-factor Authentication, Malware

Could Multi-factor Authentication really be that good?

Posted by Mark Nash on Oct 25, 2019 9:18:00 AM

Chances are that you have heard about the factors of making a strong password, like how the longer it is the better and how the use of upper-case and lower-case letters, numbers, and symbols protects you against brute force attacks. But what if I told you there was a way to make an account protected by “drowssap” or “qwerty” exponentially safer than an account protected by more complex passwords like “Th15_1$_@_P@55w0rd”? Multi-factor authentication (MFA) to the rescue! Also known as two-factor or two-step authentication, this is one of the more secure (and quite easy to implement) methods of securing your accounts. MFA can be considered a few different things. The most common form is an algorithm that generates random temporary passwords that must be entered in addition to your standard password. It could also be push notifications from third party apps that manage these MFA communications like Duo Security. This is nice because out devices all have the capability to be only unlocked through certain means like facial recognition, voice recognition, fingerprint scanners, pin numbers, or even retinal scans. What that means for you is even if your first password is compromised you have a second method of identity verification protecting your account. We here at Lighthouse IT Solutions care about your cyber security; our series of posts and webinars espousing its benefits probably convey that just fine.

Read More

Topics: Internet Safety, NCSAM, Cybersecurity, Multi-factor Authentication

Cybersecurity Needs to Be Everywhere

Posted by Mark Nash on Oct 18, 2019 9:15:00 AM

We hope that you didn't forget about National Cybersecurity Awareness Month! We wanted to discuss some elements of cybersecurity that you may not be familiar with. Cybersecurity is a lot more than just dealing with viruses and not clicking on spam emails. The true definition is "the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this." This means that anything you do to help protect against getting your data stolen can be considered cybersecurity. So let's go through some of the methods often overlooked and skipped.

Endpoint Protection

Firstly, it is important to make sure that all devices on your network have adequate protection, especially the ones you don’t normally think about. And if your computer is mobile, it is a good idea to make sure that device is encrypted and has a strong password on it. Encrypting devices that will be leaving work often, like company laptops, will help ensure company data isn't access when something is lost or stolen. Keep everything that is connected to the internet and your network in mind.Learn more about this in our "How secure is your network?" post.

Read More

Topics: Internet Safety, NCSAM, Ransomware, Cybersecurity