<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">

Recent Posts

WiFi Weak Points

Posted by Mark Nash on Mar 6, 2021 2:00:00 PM

Wireless internet (WiFi) is used nearly everywhere in the United States. WiFi enables you to access all the resources the internet has to offer. From anywhere globally, WiFi can allow you to be wireless, no more having to worry about being tethered to a cable. However, if you are not careful, it also means that anyone can also use the same access point and, potentially, even spy on your online activity. Thankfully, it is not too hard to protect your connection and keep your information private.

The first, easiest, and most obvious way to protect a WiFi connection is to give it a password. This method makes it so only people in the know can join and directly influence the network. Of course, you should follow best password practices to make sure it is not easily guessable. You can do this by using a mix of upper/lower-case letters, numbers, and symbols, as allowed. You can only implement this method on WiFi connections where you have full control, which is one of the many reasons why you should avoid connecting to and most certainly should not work with sensitive information over public WiFi.

Read More

Topics: Internet Safety, NCSAM, Cybersecurity, Malware, IoT, WiFi

Lightbulbs hearing you, FB email marketing, & the 'Lock-down Whopper'

Posted by Griffin Ball on Jun 20, 2020 1:45:00 PM

The Lighthouse IT Podcast - June 19th, 2020

Matt and Griffin discuss Breachstortion, reading sound waves through a telescope pointed at a light bulb, Facebook's new email marketing initiatives, and Burger King Brazil's new 'Lockdown Whopper'!

Listen here!

 

Security News

First there was Sextortion, now there's Breachstortion.

Well, the next big extortion scam is making its way through the internet. If you recall, Sextortion scams sent emails claiming to have "hacked" your webcam and reported you doing some private things. Well, it's getting a new upgrade in the form of pretending that they have breached your website.
Read More

Topics: Internet Safety, Ransomware, Remote Workforce, Podcast, IoT, Email Marketing