<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">
 

Recent Posts

NCSAM Reflection - Behind the Marketing

Posted by Griffin Ball on Nov 13, 2020 11:00:00 AM

The Lighthouse IT Podcast - November 13th, 2020

National Cyber Security Awareness Month may have been an onslaught of content for you, so we wanted to just take a moment to recap and give you a behind-the-scenes look at our marketing initiatives. You can still fill out your own Cyber Smart Assessment and we will still help go through it together. So, don't hold off, understand your network's position today! Head on over tothe download page.

Do Your Part. #BeCyberSmart

Listen here!

Read More

Topics: Network Risk Assessment, Internet Safety, Inside Secure-IT, NCSAM, Ransomware, Cybersecurity, Podcast

Training and Habits - NCSAM 2020

Posted by Griffin Ball on Oct 30, 2020 10:30:00 AM

The Lighthouse IT Podcast - October 30th, 2020

Being National Cyber Security Awareness Month, the podcasts this month will be a bit different! We are covering Training and Habits this week! We go over what it means to #BeCyberSmart and how you can help your business/peers stay safe from cyber criminals. Join us this week by filling out your own Cyber Smart Assessment! We will go through it together this month and at the end, you can submit your assessment to us, and we can review it together! This means you get to understand your network's position and obtain an action plan of how to make it ever more secure. Because after all, your network is only as strong as its weakest link. Still need to download it? Head on over to the download page.

Do Your Part. #BeCyberSmart

Listen here!

Read More

Topics: Network Risk Assessment, Internet Safety, Inside Secure-IT, NCSAM, Ransomware, Cybersecurity, Podcast

Preparedness and Business Continuity - NCSAM 2020

Posted by Griffin Ball on Oct 16, 2020 11:00:00 AM

The Lighthouse IT Podcast - October 16th, 2020

Being National Cyber Security Awareness Month, the podcasts this month will be a bit different! We are covering Preparedness and Business Continuity this week! We go over what it means to #BeCyberSmart and how you can help your business/peers stay safe from cyber criminals. Join us this week by filling out your own Cyber Smart Assessment! We will go through it together this month and at the end, you can submit your assessment to us, and we can review it together! This means you get to understand your network's position and obtain an action plan of how to make it ever more secure. Because after all, your network is only as strong as its weakest link. Still need to download it? Head on over to the download page.

Do Your Part. #BeCyberSmart

Listen here!

Read More

Topics: Network Risk Assessment, Internet Safety, Inside Secure-IT, NCSAM, Ransomware, Cybersecurity, Podcast

Cyber Security While Shopping Online

Posted by Mark Nash on Oct 13, 2020 4:00:00 PM

Even since the early days of the internet people have seen the potential of being able to make purchases for just about anything from the comfort of their own homes. Online shopping means that you do not have to deal with traffic, crowds, or even having to transport your purchases. However, despite the benefits of online shopping, it carries its fair share of risks. Just as with any virtual service, online shopping is often targeted by hackers who want to steal personal data and money. Although these risks exist that does not mean that you should never do any shopping online, as long as you keep safety in mind and follow good practices then the risks can be greatly mitigated. There are three primary methods that hackers use in order to steal data from online shopping transactions. 

1. Phishing

The first of these is by phishing, which is the use of fraudulent websites or emails posing as legitimate ones. Common forms of this are when a cyber-criminal makes a fraudulent website that looks just like the legitimate version of an ecommerce website, and attempts to trick the user into making a purchase through this fraudulent site thereby inadvertently giving the cyber-criminal the users data when they attempt to complete the transaction. Additionally, when a cyber-criminal creates a fraudulent email designed to look like it is coming from a legitimate source, often asking the user to follow a link to a fraudulent website to “confirm some information about a purchase the user made,” although in reality this is just an attempt to get the user to give up their information to the cyber-criminal. The best way to prevent falling victim to this sort of scam is to stay cautious and pay close attention. When performing online shopping only use reputable vendors, and always check the address bar of the site that you are shopping on to make sure that it is what it should be. Additionally, always check the sender address of any emails you receive to ensure that they are actually coming from who they say they are, and if the email asks you to follow a link hover over the link and wait for the text box to appear showing you where the link actually leads to so you can determine if you should actually click on it. 

Read More

Topics: IT services, Internet Safety, NCSAM, Ransomware, Malware