<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
  •  
  •  
 

Recent Posts

Planning for the Remote Workforce

Posted by Matt Almendinger on Mar 13, 2020 11:10:38 AM

With all the news and information surrounding “social distancing” to slow the spread of COVID-19, we are receiving lots of questions about how to prepare businesses for embracing the remote workforce. Before the actual deployment of remote services, it is a good idea to review your work processes to make sure that they can be remotely performed.

Don’t get stuck on the “how” for remote access

There are many ways to enable remote work capability. If you are working with a knowledgeable IT service provider, the “how” is determined after the what needs to be remotely accessed. Being able to describe the work process simply, will allow your service provider to determine the best course of action. Which leads us right into…

Identify your most critical processes and break them down into the simplest actions, starting with daily activities

Work processes that need to happen daily will pile up faster if a staff member is unable to work, so focusing on streamlining those items is best. Work needs that occur weekly or monthly won’t necessarily be as extreme, if they can’t be done.

Read More

Topics: Internet Safety, Community, COVID19, Remote Workforce

Introducing a Revolutionary Solution for Better Cyber Security

Posted by Mark Nash on Mar 6, 2020 11:00:00 AM

Cyber security is a vital component of any company, no matter the size or what products/services they provide. Cyber security is important for every business and individual. While antivirus and firewalls are a good start, they cannot protect a business from all the digital threats it will face. As the already massive and turbulent nature of the digital space continues to expand, cyber security needs to keep up with it. In order to provide a greater presence Lighthouse IT Solutions is happy to announce that it has partnered with Defendify to make Cyber Security easy to understand and implement.

Defendify is an all-in-one cyber security platform that has been specifically designed for small businesses. It focuses on creating a strong foundation to foster a culture of security within a company and uses its own technologies to expand a company’s existing cyber security setup.

To ensure that businesses have supporting infrastructure, Defendify:

  • helps create policies and rules to regulate the use of technology and data with cyber security in mind
  • helps create response plans that can be quickly deployed to protect the business as much as possible in the event of a cyber-attack
  • provides regular cyber security health checkups informing businesses of the vulnerability of their cyber security measures and where they can improve
  • employs the use of ethical hackers to simulate cyber-attacks and identify any weaknesses so that they can be strengthened
Read More

Topics: Navigate Training, Internet Safety, Ransomware, Cybersecurity, Multi-factor Authentication, Malware

Electronic Funds Transfer (EFT) Scams

Posted by Griffin Ball on Nov 22, 2019 8:45:00 AM

Many companies have experienced phishing scams in which a hacker (claiming to be a contractor) requests a change in bank accounts. They end up stealing funds and even make phony calls demonstrating knowledge about the project. Coupled with fake emails and bank account records, they are able to convince those managing the project to redirect all future payments to this false bank account. In the first half of 2019 alone, a Datto survey found that 56% of MSPs reported ransomware attacks against their clients. 15% of MSPs reported multiple ransomware attacks in a single day. Now that's a lot of attacks... And as a tech company, we have been seeing a huge growth in ransomware efforts in Northwest Ohio. In fact, the Ohio Facilities Construction Commission (The OFCC is responsible for guiding capital projects for the state.) has reported that numerous school districts, contractors, business owners and more are often contacted by these hackers who try to learn information about the project, effectively creating a more believable scam. "Some of these suspicious attempts to obtain the list of project contacts was portrayed as a small research project that would favorably highlight the benefits from the completed project." - OFCC

Read More

Topics: Internet Safety, Ransomware, Cybersecurity

Could Multi-factor Authentication really be that good?

Posted by Mark Nash on Oct 25, 2019 9:18:00 AM

Chances are that you have heard about the factors of making a strong password, like how the longer it is the better and how the use of upper-case and lower-case letters, numbers, and symbols protects you against brute force attacks. But what if I told you there was a way to make an account protected by “drowssap” or “qwerty” exponentially safer than an account protected by more complex passwords like “Th15_1$_@_P@55w0rd”? Multi-factor authentication (MFA) to the rescue! Also known as two-factor or two-step authentication, this is one of the more secure (and quite easy to implement) methods of securing your accounts. MFA can be considered a few different things. The most common form is an algorithm that generates random temporary passwords that must be entered in addition to your standard password. It could also be push notifications from third party apps that manage these MFA communications like Duo Security. This is nice because out devices all have the capability to be only unlocked through certain means like facial recognition, voice recognition, fingerprint scanners, pin numbers, or even retinal scans. What that means for you is even if your first password is compromised you have a second method of identity verification protecting your account. We here at Lighthouse IT Solutions care about your cyber security; our series of posts and webinars espousing its benefits probably convey that just fine.

Read More

Topics: Internet Safety, NCSAM, Cybersecurity, Multi-factor Authentication

Resource Archive Search

      Subscribe for Email Updates

      Recent Posts

      Check out our partner's blog at Sophos!

      Do stats like these give you the willies?

      APPLY FOR THE RISK ASSESSMENT

      and never worry about your network again.