<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
 

Mark Nash

Picture of

Recent Posts

Is Your Business Following Customer Service Best Practices?

Posted by Mark Nash on Apr 2, 2021 11:00:00 AM

Customer service is a vital element in every business.

After all, no business exists without customers of some type or another. (Even your co-workers or staff are considered internal-customers!) Good customer service, however, is about so much more than merely interacting with customers. It is about building an understanding with them. Customers should understand who you are, what you do, why you do it, how your product/service can benefit them, and what they need to do to gain said advantage. That is the core of customer service. But the vital question is how do you provide good customer service?

Putting yourself in the customer's shoes is the only real way to empathize with their situation and feelings. From there, it can be relatively easy to ensure they have an excellent customer service experience with you. Utilizing the three 'W's of customer service can help guide you on ensuring they understand your side as well.

  • Who will be helping them if you cannot help now
  • When will the next time you talk to them be, or when will the issue be resolved
  • What the issue resolution is or clarifies the issue if a solution isn't known so both parties can ensure they are on the same page.
Read More

Topics: Website Development, Digital Marketing, Customer Service

WiFi Weak Points

Posted by Mark Nash on Mar 6, 2021 2:00:00 PM

Wireless internet (WiFi) is used nearly everywhere in the United States. WiFi enables you to access all the resources the internet has to offer. From anywhere globally, WiFi can allow you to be wireless, no more having to worry about being tethered to a cable. However, if you are not careful, it also means that anyone can also use the same access point and, potentially, even spy on your online activity. Thankfully, it is not too hard to protect your connection and keep your information private.

The first, easiest, and most obvious way to protect a WiFi connection is to give it a password. This method makes it so only people in the know can join and directly influence the network. Of course, you should follow best password practices to make sure it is not easily guessable. You can do this by using a mix of upper/lower-case letters, numbers, and symbols, as allowed. You can only implement this method on WiFi connections where you have full control, which is one of the many reasons why you should avoid connecting to and most certainly should not work with sensitive information over public WiFi.

Read More

Topics: Internet Safety, NCSAM, Cybersecurity, Malware, IoT, WiFi

Make Your Tech Work For You!

Posted by Mark Nash on Feb 5, 2021 11:00:00 AM

‘Harmony’ has a few definitions, but the most relevant to Lighthouse IT Solutions is both the “pleasing arrangement of parts” and “internal calm.” This is what Lighthouse IT Solutions’ Harmony services strives to provide you with; a suite of IT solutions that work with each other and your business in order to harmonize with your workflow.

Harmony combines the following categories into one cohesive plan: infrastructure, security, business continuity & disaster recovery, technical support & systems management, and finally mobility.

Let's take a look at each of these and how your business can benefit from the perks of experiencing Harmony.

Technical Support & Systems Management

Technical support and systems management is, of course, the first and main pillar which we are built around. We would not be much of an IT company if we were not able to help you with your technical problems. So, to ensure that we can help you with all your tech problems Lighthouse IT Solutions offers both onsite and remote help desk support. This is all neatly managed within our ticketing system. In the event of an emergency, such as a cyber-attack that brings your workflow to a halt, we offer 24-hour support to get your systems back online as soon as possible.

Read More

Topics: Harmony, VoIP, IT services, Continued education, Office 365, Business Continuity, Managed Service Provider, Cybersecurity, Malware, Remote Workforce, Downtime

Cyber Security Awareness

Posted by Mark Nash on Oct 27, 2020 9:00:00 AM

Over these past few weeks of this year's National Cybersecurity Awareness Month (NCSAM) we have mentioned several times how one of the most important aspects of being cyber secure is being aware of potential dangers. So, it is high time that we discuss how you can go about identifying dangers and keeping yourself up to date with the latest cyber security knowledge. 

Awareness

One of the first things you should know is how to protect yourself from is phishing scams. We have an entire blog post dedicated to this subject here, but the short version is that phishing scams are when a malicious website or email tries to trick you into thinking it is legitimate and allowing it to steal your data or infect your devices. The most important things to know from this is to always scrutinize any emails that ask for your data, to follow a link, or download a file. You should always check the sender’s address to see if it is actually from who it is claiming to be. Additionally, you should find the phone number of the person or organization the email claims to be sent from and call them personally to verify the validity of the email, if the email provides you with a phone number you should verify it with research such as comparing it to the phone number on a known legitimate site before trusting it.

Read More

Topics: Network Risk Assessment, Managed Service Provider, Internet Safety, NCSAM, Cybersecurity