<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">

Recent Posts

Mobile Device Cyber-Security

Posted by Mark Nash on Mar 18, 2022 9:00:00 AM

The convenience and efficiencies that the rise of mobile devices has brought about are indisputable. However, despite the increase in mobile device reliance, their security has not kept the same pace of improvement. Contrary to what many people think, mobile devices are just as susceptible to malware as any other computer or smart device connected to a network. Many of the same cyber-security practices that you should use for computers are the same practices that you should use for your mobile devices.

Authentication

The first tip is the most obvious one, enable authentication on your device. Every device, mobile or not, that you keep private or sensitive data on should be protected with some form of authentication to restrict access to only those who are approved. This is usually a password or PIN that must be entered to get past the lock screen, but some devices allow for methods such as facial or fingerprint scans.

Read More

Topics: VoIP, Internet Safety, Backups, Cybersecurity, Malware, Remote Workforce, WiFi

Why Are Businesses Transitioning to Cloud Desktops?

Posted by Griffin Ball on Feb 18, 2022 9:00:00 AM

Business has changed how it operates, so we are changing how you can do business.

Not everyone has the time to research the highest spec hardware, let alone the money to spend on the inflated costs nowadays. However, everyone still wants to take advantage of modern hardware's incredible processing power, capacity, and reliability.

Lighthouse IT Solutions is now offering a way to get the best of both worlds! Access a full desktop experience with incredible hardware through just an internet connection via Harmony's Cloud.

Have an old laptop, tablet, phone, or Chromebook? As long as they can open a browser and have an internet connection, they'll work. Access your PC through any browser, allowing any device to be a portal to your desktop. Let us stream your work experience so that you can come back to exactly where you left off, wherever you want, however you want.

Read More

Topics: Harmony, IT services, Business Continuity, Backups, Cybersecurity, Remote Workforce, Harmony Cloud

Exchange Exploit, the Cloud on Fire, Bob Ross Painting MTN Dew & more!

Posted by Griffin Ball on Mar 12, 2021 11:34:45 AM

The Lighthouse IT Podcast - March 12th, 2021

Matt and Griff go through a lot this week, including the Massive Exploit Discovered in On-Premise Exchange, how the Largest European Cloud Hosting Provider Catches Fire, a Healthy Man Gets Text Message that He's Eligible for Vaccine for being too... Fat, AT&T and T-Mobile ban shared short codes, Burger King + International Women's day, and MTN Dew Deep-Fake with Bob Ross.

Listen here!

Read More

Topics: Internet Safety, Backups, Cybersecurity, Malware, Podcast

Cyber Security Essentials

Posted by Mark Nash on Oct 23, 2020 11:00:00 AM

Continuing the discussion on cyber security during this year's National Cybersecurity Awareness Month (NCSAM), we will be talking about the Cybersecurity and Infrastructure Security Agency’s (CISA) list of cyber security essentials.

There are three specific actions that CISA recommends all people take. 

1. Backup your data

First of these actions is to make and keep regular backups of your data. In the unfortunate event of a device malfunction or if a malware attack renders your data inaccessible, having backups can change the scenario from disastrous to inconvenient. You can read more about backups here.

Read More

Topics: Network Risk Assessment, Internet Safety, Backups, NCSAM, Cybersecurity, Multi-factor Authentication

Content not found