<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">

Recent Posts

Top 5 Cybersecurity Myths

Posted by Mark Nash on Sep 24, 2021 1:52:00 PM

Cybersecurity is a vital aspect of any organization that has sensitive information stored in a digital format. However, while we often discuss the necessity and details of cyber-security, several myths continue to surround it. In our ongoing effort to ensure people have reliable information they can use to protect their data, we will review and correct some of the more dangerous myths that can leave vulnerabilities in your cybersecurity.

Read More

Topics: Network Risk Assessment, Internet Safety, NCSAM, Ransomware, Cybersecurity, Malware

WiFi Weak Points

Posted by Mark Nash on Mar 6, 2021 2:00:00 PM

Wireless internet (WiFi) is used nearly everywhere in the United States. WiFi enables you to access all the resources the internet has to offer. From anywhere globally, WiFi can allow you to be wireless, no more having to worry about being tethered to a cable. However, if you are not careful, it also means that anyone can also use the same access point and, potentially, even spy on your online activity. Thankfully, it is not too hard to protect your connection and keep your information private.

The first, easiest, and most obvious way to protect a WiFi connection is to give it a password. This method makes it so only people in the know can join and directly influence the network. Of course, you should follow best password practices to make sure it is not easily guessable. You can do this by using a mix of upper/lower-case letters, numbers, and symbols, as allowed. You can only implement this method on WiFi connections where you have full control, which is one of the many reasons why you should avoid connecting to and most certainly should not work with sensitive information over public WiFi.

Read More

Topics: Internet Safety, NCSAM, Cybersecurity, Malware, IoT, WiFi

NCSAM Reflection - Behind the Marketing

Posted by Griffin Ball on Nov 13, 2020 11:00:00 AM

The Lighthouse IT Podcast - November 13th, 2020

National Cyber Security Awareness Month may have been an onslaught of content for you, so we wanted to just take a moment to recap and give you a behind-the-scenes look at our marketing initiatives. You can still fill out your own Cyber Smart Assessment and we will still help go through it together. So, don't hold off, understand your network's position today! Head on over tothe download page.

Do Your Part. #BeCyberSmart

Listen here!

Read More

Topics: Network Risk Assessment, Internet Safety, Inside Secure-IT, NCSAM, Ransomware, Cybersecurity, Podcast

Training and Habits - NCSAM 2020

Posted by Griffin Ball on Oct 30, 2020 10:30:00 AM

The Lighthouse IT Podcast - October 30th, 2020

Being National Cyber Security Awareness Month, the podcasts this month will be a bit different! We are covering Training and Habits this week! We go over what it means to #BeCyberSmart and how you can help your business/peers stay safe from cyber criminals. Join us this week by filling out your own Cyber Smart Assessment! We will go through it together this month and at the end, you can submit your assessment to us, and we can review it together! This means you get to understand your network's position and obtain an action plan of how to make it ever more secure. Because after all, your network is only as strong as its weakest link. Still need to download it? Head on over to the download page.

Do Your Part. #BeCyberSmart

Listen here!

Read More

Topics: Network Risk Assessment, Internet Safety, Inside Secure-IT, NCSAM, Ransomware, Cybersecurity, Podcast