<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">

Recent Posts

Printer Cyber-Security

Posted by Mark Nash on Apr 15, 2022 9:00:00 AM

Everyone is aware of the threat that hackers pose. In this digital age, it makes sense that criminals are working over the internet to break into private networks and steal data and control. Naturally, hackers tend to target the weakest link in a network to break in; however, what most commonly ends up being that weak link tends to surprise people. Printers are one of the most frequently overlooked parts of a network regarding cyber-security. A common misconception is that printers are not 'smart' like computers, essentially rendering them unhackable. However, that is, well, a misconception! While outside forces scheduling unwanted print jobs may only seem like a minor annoyance, printers can store sensitive data, meaning they can serve as a foothold to break into any other device connected to it. For your network to be protected, your printer has to be protected as well.

Read More

Topics: Harmony, Internet Safety, Cybersecurity, Malware, WiFi, Fax, Printers

Mobile Device Cyber-Security

Posted by Mark Nash on Mar 18, 2022 9:00:00 AM

The convenience and efficiencies that the rise of mobile devices has brought about are indisputable. However, despite the increase in mobile device reliance, their security has not kept the same pace of improvement. Contrary to what many people think, mobile devices are just as susceptible to malware as any other computer or smart device connected to a network. Many of the same cyber-security practices that you should use for computers are the same practices that you should use for your mobile devices.


The first tip is the most obvious one, enable authentication on your device. Every device, mobile or not, that you keep private or sensitive data on should be protected with some form of authentication to restrict access to only those who are approved. This is usually a password or PIN that must be entered to get past the lock screen, but some devices allow for methods such as facial or fingerprint scans.

Read More

Topics: VoIP, Internet Safety, Backups, Cybersecurity, Malware, Remote Workforce, WiFi

Types of Cybersecurity Threats to Worry About

Posted by Mark Nash on Oct 1, 2021 9:00:00 AM

October is National Cybersecurity Awareness Month. We here at Lighthouse IT Solutions will once again be joining to raise awareness of digital threats and offer knowledge on how to protect yourself from said threats. So the best way to start doing that is to go through the common cyber-security threats!

One of the most common methods hackers employ in breaching networks and stealing secure information is phishing attacks, which is when they disguise their malicious websites or emails as legitimate ones. We have discussed phishing before and will again in more detail next week.

Read More

Topics: Navigate Training, Managed Service Provider, Internet Safety, Ransomware, Cybersecurity, Malware, IoT, WiFi

Taco Subscription, Passwordless Accounts, and a lot of bugs

Posted by Griffin Ball on Sep 24, 2021 11:00:00 AM

The Lighthouse IT Podcast - September 24th, 2021

This week, Matt & Griff discuss Taco Bell's subscription service, Microsoft's work hour study, a universal decryptor for old versions of REvil/Sodinokibi, Microsoft accounts going passwordless, and National Cybersecurity Awareness Month is here!

Listen here!

Read More

Topics: Office 365, Internet Safety, Ransomware, Cybersecurity, Multi-factor Authentication, Malware, Podcast, WiFi

Content not found