<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
  •  
  •  
 

Recent Posts

Urgent/11 and You

Posted by Matt Almendinger on Oct 22, 2019 10:05:03 AM

Many of our clients using Buckeye and Telesystem services received a notice this morning regarding a set of zero-day vulnerabilities known as "Urgent/11" for devices running the VxWorks realtime operating system or VxWorks IPnet TCP/IP stack.

To help our clients understand the impact of this vulnerability, we are sharing the known impact of these vulnerabilities with respect to solutions provided by Lighthouse IT Solutions.

The extent of Urgent/11 is quite massive in size, due to its lightweight, high-performance nature and can be found commonly in medical devices, IP phones, firewalls, industrial controllers, elevators, and more. With this in mind, it may be necessary to contact other technology vendors to ensure that Urgent/11 does not affect a device outside of our partnerships.

Read More

Topics: Harmony, IT services, Managed Service Provider, Cybersecurity

Best way for employees to communicate internally

Posted by Laif Thorbahn on Aug 23, 2019 9:24:00 AM

Communicate internally? What's that all about?

This may seem like a no-brainer, of course we should communicate internally, but some people may not know the reason why internal communication is so important. To keep it simply, it keeps everyone in-the-loop and on task. These meetings or chats that happen with coworkers can also help build trust and increase efficiency. (Which in turn can increase enthusiasm at the workplace.) Another benefit of internal communication that gets overlooked, is that it actually helps with communication externally. If everyone knows what is going on, they are better able to answer questions clients may have. It may be surprising to some, but many businesses function without much internal communication between colleagues. With things like Microsoft Teams or Slack/GoToMetting or Zoom, there are great ways to fix this issue, but we will go over that in a bit.

What should be talked about?

Be it meetings or small chats, there are many things that can get talked about. Most would tend to lean towards more serious topics whether they be future plans for the company or how to best serve the clients they have. While these are great topics to talk about it is all too easy to forget that this time can also be used to ask questions no matter how mundane. These meetings can also be used for semi-casual conversations, like what should be for lunch that day. Again, increasing morale and efficiency.

Read More

Topics: Harmony, IT services, Office 365

What is a Network Switch?

Posted by Austin Palmer on Apr 12, 2019 9:17:00 AM

How does a internet traffic get from the Web to a computer or vise versa? Nearly all computers find their way into a Switch with rare exceptions of being routed directly through a Modem. The Network Switch goes by many names and you may have heard of a few; you can find them as a Switch, Hub and even your home Router is often a Switch combined with a Router.

Switches are necessary for a network to function and expand properly, without it you will be unable to go beyond the number of Ports on the back of your router for your wired devices. What the Switch is capable of is very simple in nature, however, it is as vital as your router itself. It will take all your wired traffic, and expand your possible connected devices considerably, often with as many as 24 to 48 extra devices.

Read More

Topics: Harmony, IT services, Managed Service Provider

6 Ways We Shield Your Business From Ransomware

Posted by Mark Nash on Mar 15, 2019 9:08:00 AM

One of the most frightening and infuriating types of malware out there is known as ransomware. What ransomware does is lock or encrypt the data on a device in order to make it inaccessible and then, as per the name, holds the data for ransom. Being threatened to pay someone in order to access your own data is absurd. This is an unfortunate reality some come to face though. If you end up being one of the unlucky ones who find themselves in that situation, there are a couple of things you can do.

Reports indicate that the ransomware strain has spread to 150 countries, impacting 10,000 organizations, 200,000 individuals 7 and 400,000 machines. Source: Barkly, “WannaCry Ransomware Statistics: The Numbers Behind the Outbreak,” May 2017.

The Possible Attack

You are often limited in terms of your possible responses to a ransomware attack by what actions you took before the attack happened, however one thing everyone can and should do is do not pay the ransom. One of the best ways to discourage hackers from using ransomware is to decrease the returns they get from it. In addition, just because you paid the ransom does not mean you will get access to your data back, it is possible (and likely) that the hacker will take one payment as an opportunity to charge you more with no plan to stop.

Read More

Topics: Harmony, IT services, Managed Service Provider, Internet Safety

Resource Archive Search

      Subscribe for Email Updates

      Recent Posts

      Check out our partner's blog at Sophos!

      Do stats like these give you the willies?

      APPLY FOR THE RISK ASSESSMENT

      and never worry about your network again.