<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">

Recent Posts

log4j vulnerability, Life360 privacy issues, Peloton marketing & more!

Posted by Griffin Ball on Dec 17, 2021 11:00:00 AM

The Lighthouse IT Podcast - December 17th, 2021

This week, Matt & Griff discuss the widespread log4j vulnerability, Life360 privacy issues on how and why they are selling user data, Mercedes fully self-driving car, Peloton counter-marketing, and more!

Listen here!

Read More

Topics: Internet Safety, Windows, Ransomware, Cybersecurity, Multi-factor Authentication, Malware, Podcast, Digital Marketing, Phishing

Bad News for Meta, Good News from Apple, Return of Clippy

Posted by Griffin Ball on Dec 3, 2021 11:00:00 AM

The Lighthouse IT Podcast - December 3rd, 2021

This week, Matt & Griff discuss the revival of Clippy (kind of), bad news for Meta, advances coming from Apple, some Windows vulnerability drama, the aftermath of the 'Buy the Constitution' movement, Samsung's new chip facility and more.

Listen here!

Read More

Topics: Internet Safety, Windows, Ransomware, Cybersecurity, Multi-factor Authentication, Malware, Podcast

Hackers Using Bots for 2FA, FBI Email Hack, & Buying the Constitution

Posted by Griffin Ball on Nov 19, 2021 11:00:00 AM

The Lighthouse IT Podcast - Novermber 19th, 2021

This week, Matt & Griff discuss hacks on Syniverse, Robinhood, and the FBI, hackers working to get around multi-factor authentication, and crypto-miners working together to buy a copy of the U.S. Constitution.

Listen here!

Read More

Topics: Internet Safety, Ransomware, Cybersecurity, Multi-factor Authentication, Malware, Podcast, Harmony Cloud

The Dangers of Shadow IT

Posted by Mark Nash on Nov 12, 2021 9:00:00 AM

Most companies leave the IT side of their business to the IT department; however, as things become easier and more accessible , Shadow IT grows. But what is it? Shadow IT is defined as IT systems and devices managed outside of the IT department without their knowledge. Shadow IT is usually performed as a quick fix by a non-IT department to solve a problem that the IT department has not (usually due to time constraints) or cannot. Sometimes, it is an attempt to make things more convenient for the end-user, but it generally becomes a bigger problem as time goes on. While Shadow IT can have benefits and has lead to several innovations, it does not come without its drawbacks.

Read More

Topics: Harmony, IT services, Managed Service Provider, Internet Safety, NCSAM, Cybersecurity, Malware