<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
 

Recent Posts

Exchange Exploit, the Cloud on Fire, Bob Ross Painting MTN Dew & more!

Posted by Griffin Ball on Mar 12, 2021 11:34:45 AM

The Lighthouse IT Podcast - March 12th, 2021

Matt and Griff go through a lot this week, including the Massive Exploit Discovered in On-Premise Exchange, how the Largest European Cloud Hosting Provider Catches Fire, a Healthy Man Gets Text Message that He's Eligible for Vaccine for being too... Fat, AT&T and T-Mobile ban shared short codes, Burger King + International Women's day, and MTN Dew Deep-Fake with Bob Ross.

Listen here!

Read More

Topics: Internet Safety, Backups, Cybersecurity, Malware, Podcast

WiFi Weak Points

Posted by Mark Nash on Mar 6, 2021 2:00:00 PM

Wireless internet (WiFi) is used nearly everywhere in the United States. WiFi enables you to access all the resources the internet has to offer. From anywhere globally, WiFi can allow you to be wireless, no more having to worry about being tethered to a cable. However, if you are not careful, it also means that anyone can also use the same access point and, potentially, even spy on your online activity. Thankfully, it is not too hard to protect your connection and keep your information private.

The first, easiest, and most obvious way to protect a WiFi connection is to give it a password. This method makes it so only people in the know can join and directly influence the network. Of course, you should follow best password practices to make sure it is not easily guessable. You can do this by using a mix of upper/lower-case letters, numbers, and symbols, as allowed. You can only implement this method on WiFi connections where you have full control, which is one of the many reasons why you should avoid connecting to and most certainly should not work with sensitive information over public WiFi.

Read More

Topics: Internet Safety, NCSAM, Cybersecurity, Malware, IoT, WiFi

Nick Cage, Hitting Emotet Where It Hurts & Business Harmony Everywhere

Posted by Griffin Ball on Feb 12, 2021 11:45:20 AM

The Lighthouse IT Podcast - February 12th, 2021

Join Matt and Griffin as they discuss Nick Cage (as usual) as well as how the giant trojan Emotet got hit pretty hard by a multinational attack and the really cool stuff Matt is doing to bring Harmony to businesses everywhere.

Listen here!

Read More

Topics: Harmony, Managed Service Provider, Internet Safety, Ransomware, Cybersecurity, Malware, Remote Workforce, Podcast

Make Your Tech Work For You!

Posted by Mark Nash on Feb 5, 2021 11:00:00 AM

‘Harmony’ has a few definitions, but the most relevant to Lighthouse IT Solutions is both the “pleasing arrangement of parts” and “internal calm.” This is what Lighthouse IT Solutions’ Harmony services strives to provide you with; a suite of IT solutions that work with each other and your business in order to harmonize with your workflow.

Harmony combines the following categories into one cohesive plan: infrastructure, security, business continuity & disaster recovery, technical support & systems management, and finally mobility.

Let's take a look at each of these and how your business can benefit from the perks of experiencing Harmony.

Technical Support & Systems Management

Technical support and systems management is, of course, the first and main pillar which we are built around. We would not be much of an IT company if we were not able to help you with your technical problems. So, to ensure that we can help you with all your tech problems Lighthouse IT Solutions offers both onsite and remote help desk support. This is all neatly managed within our ticketing system. In the event of an emergency, such as a cyber-attack that brings your workflow to a halt, we offer 24-hour support to get your systems back online as soon as possible.

Read More

Topics: Harmony, VoIP, IT services, Continued education, Office 365, Business Continuity, Managed Service Provider, Cybersecurity, Malware, Remote Workforce, Downtime