<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">

Recent Posts

Phishing Scams in 2021

Posted by Mark Nash on Oct 8, 2021 8:30:00 AM

We are now in week two of National Cybersecurity Awareness Month. And this week has an important theme, "Fight the Phish!" We have talked about phishing before, and this won't be the last time we talk about it. Phishing is one of the most common ways hackers gain access to secure networks and trick people into giving away their personal information. Because of this, it is vital to cybersecurity that you understand how to identify and handle phishing attempts.

Read More

Topics: Internet Safety, NCSAM, Cybersecurity, Malware, Phishing

Top 5 Cybersecurity Myths

Posted by Mark Nash on Sep 24, 2021 1:52:00 PM

Cybersecurity is a vital aspect of any organization that has sensitive information stored in a digital format. However, while we often discuss the necessity and details of cyber-security, several myths continue to surround it. In our ongoing effort to ensure people have reliable information they can use to protect their data, we will review and correct some of the more dangerous myths that can leave vulnerabilities in your cybersecurity.

Read More

Topics: Network Risk Assessment, Internet Safety, NCSAM, Ransomware, Cybersecurity, Malware

WiFi Weak Points

Posted by Mark Nash on Mar 6, 2021 2:00:00 PM

Wireless internet (WiFi) is used nearly everywhere in the United States. WiFi enables you to access all the resources the internet has to offer. From anywhere globally, WiFi can allow you to be wireless, no more having to worry about being tethered to a cable. However, if you are not careful, it also means that anyone can also use the same access point and, potentially, even spy on your online activity. Thankfully, it is not too hard to protect your connection and keep your information private.

The first, easiest, and most obvious way to protect a WiFi connection is to give it a password. This method makes it so only people in the know can join and directly influence the network. Of course, you should follow best password practices to make sure it is not easily guessable. You can do this by using a mix of upper/lower-case letters, numbers, and symbols, as allowed. You can only implement this method on WiFi connections where you have full control, which is one of the many reasons why you should avoid connecting to and most certainly should not work with sensitive information over public WiFi.

Read More

Topics: Internet Safety, NCSAM, Cybersecurity, Malware, IoT, WiFi

NCSAM Reflection - Behind the Marketing

Posted by Griffin Ball on Nov 13, 2020 11:00:00 AM

The Lighthouse IT Podcast - November 13th, 2020

National Cyber Security Awareness Month may have been an onslaught of content for you, so we wanted to just take a moment to recap and give you a behind-the-scenes look at our marketing initiatives. You can still fill out your own Cyber Smart Assessment and we will still help go through it together. So, don't hold off, understand your network's position today! Head on over tothe download page.

Do Your Part. #BeCyberSmart

Listen here!

Read More

Topics: Network Risk Assessment, Internet Safety, Inside Secure-IT, NCSAM, Ransomware, Cybersecurity, Podcast