<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">

Recent Posts

Colonial Pipeline gets an Apology, Twitter Blue, & Ohio Vax-a-million

Posted by Griffin Ball on May 21, 2021 11:00:00 AM

The Lighthouse IT Podcast - May 21st, 2021

Matt and Griff go through exciting stuff this week like how a security researcher's Twitter account got hacked through WordPress, the group behind the Colonial Pipeline attack issues an apology, the upcoming Twitter Blue subscription service their new tip jar, AT&T Inc. and Discovery Inc. combining forces, and finally, Ohio's Vax-a-million!

Listen here!

Read More

Topics: Internet Safety, Ransomware, Cybersecurity, Podcast

Exchange Exploit, the Cloud on Fire, Bob Ross Painting MTN Dew & more!

Posted by Griffin Ball on Mar 12, 2021 11:34:45 AM

The Lighthouse IT Podcast - March 12th, 2021

Matt and Griff go through a lot this week, including the Massive Exploit Discovered in On-Premise Exchange, how the Largest European Cloud Hosting Provider Catches Fire, a Healthy Man Gets Text Message that He's Eligible for Vaccine for being too... Fat, AT&T and T-Mobile ban shared short codes, Burger King + International Women's day, and MTN Dew Deep-Fake with Bob Ross.

Listen here!

Read More

Topics: Internet Safety, Backups, Cybersecurity, Malware, Podcast

WiFi Weak Points

Posted by Mark Nash on Mar 6, 2021 2:00:00 PM

Wireless internet (WiFi) is used nearly everywhere in the United States. WiFi enables you to access all the resources the internet has to offer. From anywhere globally, WiFi can allow you to be wireless, no more having to worry about being tethered to a cable. However, if you are not careful, it also means that anyone can also use the same access point and, potentially, even spy on your online activity. Thankfully, it is not too hard to protect your connection and keep your information private.

The first, easiest, and most obvious way to protect a WiFi connection is to give it a password. This method makes it so only people in the know can join and directly influence the network. Of course, you should follow best password practices to make sure it is not easily guessable. You can do this by using a mix of upper/lower-case letters, numbers, and symbols, as allowed. You can only implement this method on WiFi connections where you have full control, which is one of the many reasons why you should avoid connecting to and most certainly should not work with sensitive information over public WiFi.

Read More

Topics: Internet Safety, NCSAM, Cybersecurity, Malware, IoT, WiFi

Nick Cage, Hitting Emotet Where It Hurts & Business Harmony Everywhere

Posted by Griffin Ball on Feb 12, 2021 11:45:20 AM

The Lighthouse IT Podcast - February 12th, 2021

Join Matt and Griffin as they discuss Nick Cage (as usual) as well as how the giant trojan Emotet got hit pretty hard by a multinational attack and the really cool stuff Matt is doing to bring Harmony to businesses everywhere.

Listen here!

Read More

Topics: Harmony, Managed Service Provider, Internet Safety, Ransomware, Cybersecurity, Malware, Remote Workforce, Podcast