<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">

Recent Posts

Types of Cybersecurity Threats to Worry About

Posted by Mark Nash on Oct 1, 2021 9:00:00 AM

October is National Cybersecurity Awareness Month. We here at Lighthouse IT Solutions will once again be joining to raise awareness of digital threats and offer knowledge on how to protect yourself from said threats. So the best way to start doing that is to go through the common cyber-security threats!

One of the most common methods hackers employ in breaching networks and stealing secure information is phishing attacks, which is when they disguise their malicious websites or emails as legitimate ones. We have discussed phishing before and will again in more detail next week.

Read More

Topics: Navigate Training, Managed Service Provider, Internet Safety, Ransomware, Cybersecurity, Malware, IoT, WiFi

Taco Subscription, Passwordless Accounts, and a lot of bugs

Posted by Griffin Ball on Sep 24, 2021 11:00:00 AM

The Lighthouse IT Podcast - September 24th, 2021

This week, Matt & Griff discuss Taco Bell's subscription service, Microsoft's work hour study, a universal decryptor for old versions of REvil/Sodinokibi, Microsoft accounts going passwordless, and National Cybersecurity Awareness Month is here!

Listen here!

Read More

Topics: Office 365, Internet Safety, Ransomware, Cybersecurity, Multi-factor Authentication, Malware, Podcast, WiFi

More Ban News, Gift Card Gang, Cyber Attacks, Blockchain art & more!

Posted by Griffin Ball on Sep 10, 2021 11:00:00 AM

The Lighthouse IT Podcast - September 10th, 2021

This week, we discuss OnlyFans making our last podcast outdated before we even released it, China placing bans on online gaming, the latest developments and threats to cyber-security, the Gift Card Gang, and the NFT from Vine co-founder Dom Hofmann. Also, we promise that this is relevant.

Listen here!

Read More

Topics: Office 365, Internet Safety, Ransomware, Cybersecurity, Multi-factor Authentication, Malware, Podcast, WiFi

WiFi Weak Points

Posted by Mark Nash on Mar 6, 2021 2:00:00 PM

Wireless internet (WiFi) is used nearly everywhere in the United States. WiFi enables you to access all the resources the internet has to offer. From anywhere globally, WiFi can allow you to be wireless, no more having to worry about being tethered to a cable. However, if you are not careful, it also means that anyone can also use the same access point and, potentially, even spy on your online activity. Thankfully, it is not too hard to protect your connection and keep your information private.

The first, easiest, and most obvious way to protect a WiFi connection is to give it a password. This method makes it so only people in the know can join and directly influence the network. Of course, you should follow best password practices to make sure it is not easily guessable. You can do this by using a mix of upper/lower-case letters, numbers, and symbols, as allowed. You can only implement this method on WiFi connections where you have full control, which is one of the many reasons why you should avoid connecting to and most certainly should not work with sensitive information over public WiFi.

Read More

Topics: Internet Safety, NCSAM, Cybersecurity, Malware, IoT, WiFi