<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
 

Recent Posts

Nick Cage, Hitting Emotet Where It Hurts & Business Harmony Everywhere

Posted by Griffin Ball on Feb 12, 2021 11:45:20 AM

The Lighthouse IT Podcast - February 12th, 2021

Join Matt and Griffin as they discuss Nick Cage (as usual) as well as how the giant trojan Emotet got hit pretty hard by a multinational attack and the really cool stuff Matt is doing to bring Harmony to businesses everywhere.

Listen here!

Read More

Topics: Harmony, Managed Service Provider, Internet Safety, Ransomware, Cybersecurity, Malware, Remote Workforce, Podcast

Make Your Tech Work For You!

Posted by Mark Nash on Feb 5, 2021 11:00:00 AM

‘Harmony’ has a few definitions, but the most relevant to Lighthouse IT Solutions is both the “pleasing arrangement of parts” and “internal calm.” This is what Lighthouse IT Solutions’ Harmony services strives to provide you with; a suite of IT solutions that work with each other and your business in order to harmonize with your workflow.

Harmony combines the following categories into one cohesive plan: infrastructure, security, business continuity & disaster recovery, technical support & systems management, and finally mobility.

Let's take a look at each of these and how your business can benefit from the perks of experiencing Harmony.

Technical Support & Systems Management

Technical support and systems management is, of course, the first and main pillar which we are built around. We would not be much of an IT company if we were not able to help you with your technical problems. So, to ensure that we can help you with all your tech problems Lighthouse IT Solutions offers both onsite and remote help desk support. This is all neatly managed within our ticketing system. In the event of an emergency, such as a cyber-attack that brings your workflow to a halt, we offer 24-hour support to get your systems back online as soon as possible.

Read More

Topics: Harmony, VoIP, IT services, Continued education, Office 365, Business Continuity, Managed Service Provider, Cybersecurity, Malware, Remote Workforce, Downtime

The Concerns of Infrastructure Takedowns

Posted by Griffin Ball on Jan 15, 2021 11:06:00 AM

The Lighthouse IT Podcast - January 15th, 2021

Join Matt and Griff today as they discuss the concerns about infrastructure takedowns, moderation rules, internet policy and more. Should the internet be user-driven vs crisis-driven? Who is responsible for censorship? Are infrastructure takedowns more or less likely to silence other voices? Let's discuss!

Listen here!

Read More

Topics: Business Continuity, Managed Service Provider, Internet Safety, Podcast

Cyber Security Awareness

Posted by Mark Nash on Oct 27, 2020 9:00:00 AM

Over these past few weeks of this year's National Cybersecurity Awareness Month (NCSAM) we have mentioned several times how one of the most important aspects of being cyber secure is being aware of potential dangers. So, it is high time that we discuss how you can go about identifying dangers and keeping yourself up to date with the latest cyber security knowledge. 

Awareness

One of the first things you should know is how to protect yourself from is phishing scams. We have an entire blog post dedicated to this subject here, but the short version is that phishing scams are when a malicious website or email tries to trick you into thinking it is legitimate and allowing it to steal your data or infect your devices. The most important things to know from this is to always scrutinize any emails that ask for your data, to follow a link, or download a file. You should always check the sender’s address to see if it is actually from who it is claiming to be. Additionally, you should find the phone number of the person or organization the email claims to be sent from and call them personally to verify the validity of the email, if the email provides you with a phone number you should verify it with research such as comparing it to the phone number on a known legitimate site before trusting it.

Read More

Topics: Network Risk Assessment, Managed Service Provider, Internet Safety, NCSAM, Cybersecurity