<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">

Recent Posts

The Dangers of Shadow IT

Posted by Mark Nash on Nov 12, 2021 9:00:00 AM

Most companies leave the IT side of their business to the IT department; however, as things become easier and more accessible , Shadow IT grows. But what is it? Shadow IT is defined as IT systems and devices managed outside of the IT department without their knowledge. Shadow IT is usually performed as a quick fix by a non-IT department to solve a problem that the IT department has not (usually due to time constraints) or cannot. Sometimes, it is an attempt to make things more convenient for the end-user, but it generally becomes a bigger problem as time goes on. While Shadow IT can have benefits and has lead to several innovations, it does not come without its drawbacks.

Read More

Topics: Harmony, IT services, Managed Service Provider, Internet Safety, NCSAM, Cybersecurity, Malware

Metaverse, more China bans, REvil news, and a side of Crypto

Posted by Griffin Ball on Nov 5, 2021 11:00:00 AM

The Lighthouse IT Podcast - Novermber 5th, 2021

This week, Matt & Griff discuss Facebook and Microsoft's moves to become their own metaverses, LinkedIn releases a new freelance marketplace while simultaneously pulling out of China, along with several other services, in addition to the US banning China Telecom, REvil being forced offline, and more.

Listen here!

Read More

Topics: Harmony, Business Continuity, Network Risk Assessment, Internet Safety, Website Development, NCSAM, Ransomware, Cybersecurity, Multi-factor Authentication, Malware, Podcast, Harmony Cloud

What is Ransomware as a Service? (RaaS)

Posted by Mark Nash on Nov 5, 2021 9:00:00 AM

Ransomware continues to grow, not only as one of the most popular forms of malware but also as one of the largest industries in the world. And no small part of this growth is due to the rise of ransomware as a service. Ransomware as a service is similar to any other software as a service in that the developer leases the use of the software to anyone willing to pay for it. However, in this case, the software is ransomware, meaning that anyone can launch a ransomware attack even without significant technical knowledge. In 2020 alone, the total revenue generated by ransomware is estimated to be around $20 billion.

Read More

Topics: Business Continuity, Managed Service Provider, Internet Safety, NCSAM, Ransomware, Malware, Downtime

Preparing and Recovering from a Cyber Attack

Posted by Mark Nash on Oct 29, 2021 8:45:00 AM

While you can take many steps to mitigate the risks, there is, unfortunately, no practical way to ensure that you will never become the victim of a malware attack. Because of this, in addition to taking steps to lower the risk of a malware attack, you should also prepare for and have plans in place to recover from a malware attack. This guide to for just that, to provide you with several practical ways to keep yourself safe, even in the event that you suffer a malware attack.

Read More

Topics: Business Continuity, Managed Service Provider, Internet Safety, Ransomware, Cybersecurity, Malware, Downtime