<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
  •  
  •  
 

Recent Posts

Lightbulbs hearing you, FB email marketing, & the 'Lock-down Whopper'

Posted by Griffin Ball on Jun 20, 2020 1:45:00 PM

The Lighthouse IT Podcast - June 19th, 2020

Matt and Griffin discuss Breachstortion, reading sound waves through a telescope pointed at a light bulb, Facebook's new email marketing initiatives, and Burger King Brazil's new 'Lockdown Whopper'!

Listen here!

 

Security News

First there was Sextortion, now there's Breachstortion.

Well, the next big extortion scam is making its way through the internet. If you recall, Sextortion scams sent emails claiming to have "hacked" your webcam and reported you doing some private things. Well, it's getting a new upgrade in the form of pretending that they have breached your website.
Read More

Topics: Internet Safety, Ransomware, Remote Workforce, Podcast, IoT, Email Marketing

Flaws in Apple sign-in, Upgrading to Android 10, and Core Web Vitals

Posted by Griffin Ball on Jun 5, 2020 10:59:49 AM

The Lighthouse IT Podcast - June 5th, 2020

Matt and Griffin are back as they discuss how Sign-in with Apple was much easier than we all thought, why it may be a good reason to upgrade to the dreaded Android 10,  and what updates Google has been making to the world of SEO.

Listen here!

Security News  

Apple Security News 

We’ve all used the log-in service on a website or app by supplying our Facebook or Google credentials. Just like these providers, the sign-in with Apple allows site visitors to use their Apple ID credentials to sign-in to other websites. 

A security research from Delhi, India has discovered an account takeover flaw in Apple's Sign-in with Apple system. These systems work by allowing you to login to a popular service and receiving a "token" that authorizes you access to the websites that use the login service. 

The security researcher discovered if he could identify a valid email address of an Apple ID (which was openly contained in an initial login request), he could pass the email address to a publicly accessible web service and retrieve a valid token. No password was required to do this. 

Luckily, because of the bug report being completed properly, Apple was able to very quickly patch the open flaw and states that its investigations did not show any misuse or compromise. Which is good news for services such as Adobe, Airbnb, Dropbox, eBay, Grindr, Medium, Strava, Tik Tok, and even WordPress that utilize this log-in method. 

READ MORE

Read More

Topics: Managed Service Provider, Internet Safety, SEO, Cybersecurity, Multi-factor Authentication, Malware, Podcast

How has COVID-19 influenced security and changed our marketing efforts

Posted by Griffin Ball on May 22, 2020 4:45:21 PM

The Lighthouse IT Podcast - May 22nd, 2020

This week, Matt and Griffin focus on reviewing topics that continue to appear in all industries, as well as specific ones. Since digital security impacts everyone, if you’re not careful, you could end up being the direct link to a company-wide hack! But on a more positive note, how are marketing and sales efforts looking as businesses begin to reopen and how can we make use of sales tools to hit that bullseye for our goals this year?

Listen here!

Security News  

CISA & FBI public service announcement

No surprise to the security industry, but COVID-19 infections reach far beyond infecting people...  On May 13th, CISA and the FBI issued a public service announcement warning organizations researching COVID-19 that they will likely be the targets of attempted network compromise by the People's Republic of China and is recommending companies in these sectors to take additional precautions and report suspicious activities to CISA. 

READ MORE

Read More

Topics: Managed Service Provider, Internet Safety, Cybersecurity, COVID19, Remote Workforce, Podcast

Planning for the Remote Workforce

Posted by Matt Almendinger on Mar 13, 2020 11:10:38 AM

With all the news and information surrounding “social distancing” to slow the spread of COVID-19, we are receiving lots of questions about how to prepare businesses for embracing the remote workforce. Before the actual deployment of remote services, it is a good idea to review your work processes to make sure that they can be remotely performed.

Don’t get stuck on the “how” for remote access

There are many ways to enable remote work capability. If you are working with a knowledgeable IT service provider, the “how” is determined after the what needs to be remotely accessed. Being able to describe the work process simply, will allow your service provider to determine the best course of action. Which leads us right into…

Identify your most critical processes and break them down into the simplest actions, starting with daily activities

Work processes that need to happen daily will pile up faster if a staff member is unable to work, so focusing on streamlining those items is best. Work needs that occur weekly or monthly won’t necessarily be as extreme, if they can’t be done.

Read More

Topics: Internet Safety, Community, COVID19, Remote Workforce