<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
  •  
  •  
 

Recent Posts

More Apple Store Drama, Ransomware Wins and the New Facebook

Posted by Griffin Ball on Sep 4, 2020 10:09:33 AM

The Lighthouse IT Podcast - September 4th, 2020

Matt and Griffin discuss self-destructing DVDs, more Apple store drama, another win against ransomware, Walmart joining in on the TikTok deal, and the New Facebook.

Listen here! Go to the 3:00min mark to skip the intro.

Security News

Apple "Tax" drama continues - but with an additional contender

In a bid to help small businesses cope with financial loss, Facebook announced a new feature allowing "paid for" events on the platform, making it easy for small businesses to host virtual meetings to stay engaged with customers. To further its value, Facebook stated that it would not be taking a cut of any payment made to those businesses as way to support them during this time.

Read More

Topics: Internet Safety, Ransomware, Cybersecurity, Podcast, Digital Marketing

Apple Gave Epic a fortnight, Influencer Resilience & Reeling in TikTok

Posted by Griffin Ball on Aug 21, 2020 11:00:00 AM

The Lighthouse IT Podcast - August 21st, 2020

Matt and Griffin discuss "Proof" that criminals have no boundaries, how Apple gave Epic Games a fortnight before getting kicked off the app store, the launch of Instagram's TikTok competitor (Reels), the uphill battle that TV Ads have had to face, and finally two of the largest influencer ad agencies merging.

Listen here! Want to skip the intro? Go to the 1:45min mark.

Security News

"Proof" that criminals have no boundaries

Brown-Forman, headquartered in Louisville, Kentucky is a multi-million dollar business that is the latest high profile company to fall victim to "new wave" ransomware operators. The company, better known for its properties of Finlandia vodka and Jack Daniels, among other major global brands, was the target by the REvil crew.

 
In new wave ransomware, the group operates on a 3 stage attack, an additional tactic over the normal 2 stage.
  • In the first stage, they scope out the network to see if it is worth their time. Checking out backups, administrative tools, and more.
  • In the second stage (the new stage), they steal the data - called exfiltration.
  • Finally, the attempt to encrypt network files.
The idea is that even if you do have backups, the stolen data can be used for blackmail.
Read More

Topics: Internet Safety, SEO, Ransomware, Cybersecurity, Podcast, Digital Marketing