<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
 

Recent Posts

Cyber Security Awareness

Posted by Mark Nash on Oct 27, 2020 9:00:00 AM

Over these past few weeks of this year's National Cybersecurity Awareness Month (NCSAM) we have mentioned several times how one of the most important aspects of being cyber secure is being aware of potential dangers. So, it is high time that we discuss how you can go about identifying dangers and keeping yourself up to date with the latest cyber security knowledge. 

Awareness

One of the first things you should know is how to protect yourself from is phishing scams. We have an entire blog post dedicated to this subject here, but the short version is that phishing scams are when a malicious website or email tries to trick you into thinking it is legitimate and allowing it to steal your data or infect your devices. The most important things to know from this is to always scrutinize any emails that ask for your data, to follow a link, or download a file. You should always check the sender’s address to see if it is actually from who it is claiming to be. Additionally, you should find the phone number of the person or organization the email claims to be sent from and call them personally to verify the validity of the email, if the email provides you with a phone number you should verify it with research such as comparing it to the phone number on a known legitimate site before trusting it.

Read More

Topics: Network Risk Assessment, Managed Service Provider, Internet Safety, NCSAM, Cybersecurity

The Importance of Protection

Posted by Griffin Ball on Oct 9, 2020 2:45:00 PM
This was the first full week of National Cybersecurity Awareness Month (NCSAM)!

As per cisa.gov, this week's topic is “If You Connect It, Protect It.” While networks, like the internet, are amazing tools that allow us to connect devices and share information between them, they are also security risks as the other devices you connect to can be malicious. Don't panic! With a bit of awareness and a few tools, it's easy keep your devices safe.

If a device is connected to a network, it needs antivirus software to monitor for malicious activity and to remove the sneaky software. Lighthouse IT Solutions recommends Sophos for all your devices, whether they are on your home or business network. For devices on your home network you can find the free or premium version for Sophos Home here.

Read More

Topics: IT services, Managed Service Provider, Internet Safety, NCSAM, Ransomware, Cybersecurity

We have joined the ASCII Group community!

Posted by Matt Almendinger on Aug 14, 2020 11:00:00 AM

One of the driving forces at Lighthouse IT Solutions has always been community. It’s what gets me out of bed in the morning. We love community in all of its forms - whether we are reviewing our vendors or our clients. However, one of the areas that we believe we have lacked as a provider is a community that represents our industry.

Unfortunately, all too often, it is hard to not get caught up in competition with our peers, making it difficult to find a place that allows us to have community with those in our industry. That competitive spirit can be a wedge between great opportunities. Well we are excited to announce that through this self-awareness, we have sought to fix this gap and found such an opportunity that will positively impact our clients.

So, it is my personal pleasure to announce that Lighthouse IT Solutions has joined the ASCII Group community. The ASCII Group is a collection of IT companies working together to better the industry and raise the bar, so to speak. This not only helps us here at Lighthouse to be better, but it allows us to offer more to our clients.

Read More

Topics: Harmony, IT services, Business Continuity, Managed Service Provider

Flaws in Apple sign-in, Upgrading to Android 10, and Core Web Vitals

Posted by Griffin Ball on Jun 5, 2020 10:59:49 AM

The Lighthouse IT Podcast - June 5th, 2020

Matt and Griffin are back as they discuss how Sign-in with Apple was much easier than we all thought, why it may be a good reason to upgrade to the dreaded Android 10,  and what updates Google has been making to the world of SEO.

Listen here!

Security News  

Apple Security News 

We’ve all used the log-in service on a website or app by supplying our Facebook or Google credentials. Just like these providers, the sign-in with Apple allows site visitors to use their Apple ID credentials to sign-in to other websites. 

A security research from Delhi, India has discovered an account takeover flaw in Apple's Sign-in with Apple system. These systems work by allowing you to login to a popular service and receiving a "token" that authorizes you access to the websites that use the login service. 

The security researcher discovered if he could identify a valid email address of an Apple ID (which was openly contained in an initial login request), he could pass the email address to a publicly accessible web service and retrieve a valid token. No password was required to do this. 

Luckily, because of the bug report being completed properly, Apple was able to very quickly patch the open flaw and states that its investigations did not show any misuse or compromise. Which is good news for services such as Adobe, Airbnb, Dropbox, eBay, Grindr, Medium, Strava, Tik Tok, and even WordPress that utilize this log-in method. 

READ MORE

Read More

Topics: Managed Service Provider, Internet Safety, SEO, Cybersecurity, Multi-factor Authentication, Malware, Podcast