•  
  •  
 

Recent Posts

Cybersecurity Needs to Be Everywhere

Posted by Mark Nash on Oct 18, 2019 9:15:00 AM

We hope that you didn't forget about National Cybersecurity Awareness Month! We wanted to discuss some elements of cybersecurity that you may not be familiar with. Cybersecurity is a lot more than just dealing with viruses and not clicking on spam emails. The true definition is "the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this." This means that anything you do to help protect against getting your data stolen can be considered cybersecurity. So let's go through some of the methods often overlooked and skipped.

Endpoint Protection

Firstly, it is important to make sure that all devices on your network have adequate protection especially the ones you don’t normally think about. If your computer is connected to a wireless printer you should make sure that printer is encrypted and has a strong password on it, the same applies to your router. Encrypting devices that will be leaving work often, like company laptops, will help ensure company data isn't access when something is lost or stolen. Keep everything that is connected to the internet and your network in mind.

Read More

Topics: Internet Safety, NCSAM, Ransomware, Cybersecurity

Cybersecurity Does Not Need to Be Scary!

Posted by Mark Nash on Oct 11, 2019 10:48:00 PM

Lighthouse IT hopes you find yourself cyber-safe during this spooky October...

Especially considering it's National Cybersecurity Awareness Month!

However, if you are worried that you do not know enough about cyber security or maybe you are not sure that your company is set up to protect themselves, then here are some helpful tips that should guide you towards peace of mind.

Everyone knows that if you want something to be locked behind a gate, you need a password and that password needs to be strong. While it is smarter to make your passwords longer (no password should be shorter than eight characters), there are other ways to increase the strength of them. Using a mix of uppercase and lowercase letters, numbers, and symbols is a great example of this, but believe it or not, there are more tactics!

MFA and Two-Step

There are also requirements you can set to add a second level of protection to your accounts. This is called multi-factor authentication or two-step authentication. This can include things such as using authenticator tools, like Duo Security, which provides you with random one-time codes needed to login, or push notifications on your phone to confirm your identity. Alternatively, if you want to truly ensure that only you can login, you could use biometric verification. Things like fingerprint readers, facial recognition software, or even retinal scanners can replace the need for a password all together!

Read More

Topics: NCSAM, Ransomware, Cybersecurity

The Importance of Cybersecurity

Posted by Mark Nash on Oct 4, 2019 8:45:00 AM

October is National Cybersecurity Awareness Month (NCSAM)!

Now is the perfect time to talk about being safe online!

One of the most important things to remember for cyber security is that everyone needs to be active in it. It only takes one person clicking a sketchy download from a phishing email to compromise an entire network. Knowing how to be safe online does not require you to learn a load of technical jargon. You simply need an idea of what actions could be detrimental and be able to keep an awareness for anything that seems fishy. This can keep you much safer.

There are lots of actions you can take to increase your safety such as:

  • Checking that your system is running up-to-date security programs and read up on what scams and exploits people are using.
  • Making sure you have an enterprise-grade firewall protecting your business.
  • Backing-up all of your data so that you are ready for the worst.
  • Implementing user-based security and permissions to minimize human errors.
  • Getting a password and document manager to ensure password security.
  • You could even enlist the services of a certified ethical hacker to test your system’s security and inform you of any vulnerabilities they find.
Read More

Topics: IT services, Internet Safety, NCSAM, Ransomware, Cybersecurity

Resource Archive Search

      Subscribe for Email Updates

      Recent Posts

      Check out our partner's blog at Sophos!

      Do stats like these give you the willies?

      APPLY FOR THE RISK ASSESSMENT

      and never worry about your network again.