<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">

Recent Posts

What is Ransomware as a Service? (RaaS)

Posted by Mark Nash on Nov 5, 2021 9:00:00 AM

Ransomware continues to grow, not only as one of the most popular forms of malware but also as one of the largest industries in the world. And no small part of this growth is due to the rise of ransomware as a service. Ransomware as a service is similar to any other software as a service in that the developer leases the use of the software to anyone willing to pay for it. However, in this case, the software is ransomware, meaning that anyone can launch a ransomware attack even without significant technical knowledge. In 2020 alone, the total revenue generated by ransomware is estimated to be around $20 billion.

Read More

Topics: Business Continuity, Managed Service Provider, Internet Safety, NCSAM, Ransomware, Malware, Downtime

Preparing and Recovering from a Cyber Attack

Posted by Mark Nash on Oct 29, 2021 8:45:00 AM

While you can take many steps to mitigate the risks, there is, unfortunately, no practical way to ensure that you will never become the victim of a malware attack. Because of this, in addition to taking steps to lower the risk of a malware attack, you should also prepare for and have plans in place to recover from a malware attack. This guide to for just that, to provide you with several practical ways to keep yourself safe, even in the event that you suffer a malware attack.

Read More

Topics: Business Continuity, Managed Service Provider, Internet Safety, Ransomware, Cybersecurity, Malware, Downtime

Make Your Tech Work For You!

Posted by Mark Nash on Feb 5, 2021 11:00:00 AM

‘Harmony’ has a few definitions, but the most relevant to Lighthouse IT Solutions is both the “pleasing arrangement of parts” and “internal calm.” This is what Lighthouse IT Solutions’ Harmony services strives to provide you with; a suite of IT solutions that work with each other and your business in order to harmonize with your workflow.

Harmony combines the following categories into one cohesive plan: infrastructure, security, business continuity & disaster recovery, technical support & systems management, and finally mobility.

Let's take a look at each of these and how your business can benefit from the perks of experiencing Harmony.

Technical Support & Systems Management

Technical support and systems management is, of course, the first and main pillar which we are built around. We would not be much of an IT company if we were not able to help you with your technical problems. So, to ensure that we can help you with all your tech problems Lighthouse IT Solutions offers both onsite and remote help desk support. This is all neatly managed within our ticketing system. In the event of an emergency, such as a cyber-attack that brings your workflow to a halt, we offer 24-hour support to get your systems back online as soon as possible.

Read More

Topics: Harmony, VoIP, IT services, Continued education, Office 365, Business Continuity, Managed Service Provider, Cybersecurity, Malware, Remote Workforce, Downtime

Cyber Attack on FireEye, Influencers Under Pressure & Daytime TV Ads

Posted by Griffin Ball on Dec 11, 2020 11:00:00 AM

The Lighthouse IT Podcast - DECEMBER 11th, 2020

This week, Matt and Griffin go over the recent attack on the huge cyber security company, FireEye and their Red Team tools. In marketing news, they cover some developments in the influencer marketing world as well as interesting Daytime TV statistics.

Listen here!

Security News

FireEye and their Red Team tools

The cybersecurity giant, FireEye, was recently hit with a cyber attack in which there was unauthorized access to their suite of tools used to evaluate the security posture of enterprise systems. In other words, this highly sophisticated threat actor took tools from this company who could then use them maliciously. Luckly, FireEye has released two blog posts with more information and a GitHub repository for detection countermeasures. This was certainly an expensive incident for them though, as well as embarrassing, time consuming, and stressful.
Read More

Topics: Internet Safety, Ransomware, Cybersecurity, Malware, Downtime, Podcast

Content not found