<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
 

Recent Posts

NCSAM Reflection - Behind the Marketing

Posted by Griffin Ball on Nov 13, 2020 11:00:00 AM

The Lighthouse IT Podcast - November 13th, 2020

National Cyber Security Awareness Month may have been an onslaught of content for you, so we wanted to just take a moment to recap and give you a behind-the-scenes look at our marketing initiatives. You can still fill out your own Cyber Smart Assessment and we will still help go through it together. So, don't hold off, understand your network's position today! Head on over tothe download page.

Do Your Part. #BeCyberSmart

Listen here!

Read More

Topics: Network Risk Assessment, Internet Safety, Inside Secure-IT, NCSAM, Ransomware, Cybersecurity, Podcast

Training and Habits - NCSAM 2020

Posted by Griffin Ball on Oct 30, 2020 10:30:00 AM

The Lighthouse IT Podcast - October 30th, 2020

Being National Cyber Security Awareness Month, the podcasts this month will be a bit different! We are covering Training and Habits this week! We go over what it means to #BeCyberSmart and how you can help your business/peers stay safe from cyber criminals. Join us this week by filling out your own Cyber Smart Assessment! We will go through it together this month and at the end, you can submit your assessment to us, and we can review it together! This means you get to understand your network's position and obtain an action plan of how to make it ever more secure. Because after all, your network is only as strong as its weakest link. Still need to download it? Head on over to the download page.

Do Your Part. #BeCyberSmart

Listen here!

Read More

Topics: Network Risk Assessment, Internet Safety, Inside Secure-IT, NCSAM, Ransomware, Cybersecurity, Podcast

Cyber Security Awareness

Posted by Mark Nash on Oct 27, 2020 9:00:00 AM

Over these past few weeks of this year's National Cybersecurity Awareness Month (NCSAM) we have mentioned several times how one of the most important aspects of being cyber secure is being aware of potential dangers. So, it is high time that we discuss how you can go about identifying dangers and keeping yourself up to date with the latest cyber security knowledge. 

Awareness

One of the first things you should know is how to protect yourself from is phishing scams. We have an entire blog post dedicated to this subject here, but the short version is that phishing scams are when a malicious website or email tries to trick you into thinking it is legitimate and allowing it to steal your data or infect your devices. The most important things to know from this is to always scrutinize any emails that ask for your data, to follow a link, or download a file. You should always check the sender’s address to see if it is actually from who it is claiming to be. Additionally, you should find the phone number of the person or organization the email claims to be sent from and call them personally to verify the validity of the email, if the email provides you with a phone number you should verify it with research such as comparing it to the phone number on a known legitimate site before trusting it.

Read More

Topics: Network Risk Assessment, Managed Service Provider, Internet Safety, NCSAM, Cybersecurity

Cyber Security Essentials

Posted by Mark Nash on Oct 23, 2020 11:00:00 AM

Continuing the discussion on cyber security during this year's National Cybersecurity Awareness Month (NCSAM), we will be talking about the Cybersecurity and Infrastructure Security Agency’s (CISA) list of cyber security essentials.

There are three specific actions that CISA recommends all people take. 

1. Backup your data

First of these actions is to make and keep regular backups of your data. In the unfortunate event of a device malfunction or if a malware attack renders your data inaccessible, having backups can change the scenario from disastrous to inconvenient. You can read more about backups here.

Read More

Topics: Network Risk Assessment, Internet Safety, Backups, NCSAM, Cybersecurity, Multi-factor Authentication