<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
  •  
  •  
 

Recent Posts

Urgent/11 and You

Posted by Matt Almendinger on Oct 22, 2019 10:05:03 AM

Many of our clients using Buckeye and Telesystem services received a notice this morning regarding a set of zero-day vulnerabilities known as "Urgent/11" for devices running the VxWorks realtime operating system or VxWorks IPnet TCP/IP stack.

To help our clients understand the impact of this vulnerability, we are sharing the known impact of these vulnerabilities with respect to solutions provided by Lighthouse IT Solutions.

The extent of Urgent/11 is quite massive in size, due to its lightweight, high-performance nature and can be found commonly in medical devices, IP phones, firewalls, industrial controllers, elevators, and more. With this in mind, it may be necessary to contact other technology vendors to ensure that Urgent/11 does not affect a device outside of our partnerships.

Read More

Topics: Harmony, IT services, Managed Service Provider, Cybersecurity

Windows 7 End of Life

Posted by Laif Thorbahn on Jul 26, 2019 9:06:00 AM

Just as everything dies, Windows 7 is reaching it's end of life. It may be sad for some, but Microsoft will no longer be supporting it as of January 14th, 2020. So the question stands, what do you need to do if you are currently running Windows 7?

A Brief History of Windows 7.

First, let's start with a look back at the history of this operating system. Windows 7 was originally released in July of 2009 and has been an OS powerhouse for a decade. Over those years, it became a household name and was widely praised by both home and business users alike. In the first years, Window 7 had sold over 630 million copies worldwide and for a long time was the most popular desktop operating system in the world. That title was only lost recently when Windows 10 overtook in the latter part of 2018.

Read More

Topics: IT services, Managed Service Provider, Windows

What is a Network Switch?

Posted by Austin Palmer on Apr 12, 2019 9:17:00 AM

How does a internet traffic get from the Web to a computer or vise versa? Nearly all computers find their way into a Switch with rare exceptions of being routed directly through a Modem. The Network Switch goes by many names and you may have heard of a few; you can find them as a Switch, Hub and even your home Router is often a Switch combined with a Router.

Switches are necessary for a network to function and expand properly, without it you will be unable to go beyond the number of Ports on the back of your router for your wired devices. What the Switch is capable of is very simple in nature, however, it is as vital as your router itself. It will take all your wired traffic, and expand your possible connected devices considerably, often with as many as 24 to 48 extra devices.

Read More

Topics: Harmony, IT services, Managed Service Provider

6 Ways We Shield Your Business From Ransomware

Posted by Mark Nash on Mar 15, 2019 9:08:00 AM

One of the most frightening and infuriating types of malware out there is known as ransomware. What ransomware does is lock or encrypt the data on a device in order to make it inaccessible and then, as per the name, holds the data for ransom. Being threatened to pay someone in order to access your own data is absurd. This is an unfortunate reality some come to face though. If you end up being one of the unlucky ones who find themselves in that situation, there are a couple of things you can do.

Reports indicate that the ransomware strain has spread to 150 countries, impacting 10,000 organizations, 200,000 individuals 7 and 400,000 machines. Source: Barkly, “WannaCry Ransomware Statistics: The Numbers Behind the Outbreak,” May 2017.

The Possible Attack

You are often limited in terms of your possible responses to a ransomware attack by what actions you took before the attack happened, however one thing everyone can and should do is do not pay the ransom. One of the best ways to discourage hackers from using ransomware is to decrease the returns they get from it. In addition, just because you paid the ransom does not mean you will get access to your data back, it is possible (and likely) that the hacker will take one payment as an opportunity to charge you more with no plan to stop.

Read More

Topics: Harmony, IT services, Managed Service Provider, Internet Safety

Resource Archive Search

      Subscribe for Email Updates

      Recent Posts

      Check out our partner's blog at Sophos!

      Do stats like these give you the willies?

      APPLY FOR THE RISK ASSESSMENT

      and never worry about your network again.