Data Backup Protection The need to back up data has been around since floppy disks. Data loss can happen due to malware, hard drive crashes, and many other mishaps. There are about 140,000 hard drive crashes in the US weekl... Business Continuity Cybersecurity Jul 19, 2023
How to Handle a Hacked Account Online accounts are vulnerable to hacking. It's a baked-in risk when you have a service that is accessible via the internet. If you experience an account hack, it can be shocking, confusing, and infur... Business Continuity Cybersecurity Jun 7, 2023
Cybersecurity Insurance Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for large enterprises . It covered things like data processing errors ... Business Continuity Cybersecurity May 17, 2023
Mobile Device Cyber-Security The convenience and efficiencies that the rise of mobile devices has brought about are indisputable. However, despite the increase in mobile device reliance, their security has not kept the same pace ... Business Continuity Cybersecurity Mar 18, 2022
The Dangers of Shadow IT Most companies leave the IT side of their business to the IT department; however, as things become easier and more accessible , Shadow IT grows. But what is it? Shadow IT is defined as IT systems and ... Business Continuity Cybersecurity Managed Services Nov 12, 2021
Preparing and Recovering from a Cyber Attack While you can take many steps to mitigate the risks, there is, unfortunately, no practical way to ensure that you will never become the victim of a malware attack. Because of this, in addition to taki... Business Continuity Cybersecurity NCSAM Oct 29, 2021
The Dangers of BYOD or 'Bring Your Own Device' Bring your own device or BYOD is a business/IT practice where employees use their personal devices to access work systems and data. BYOD is a hotly contested concept in the IT-sphere due to the inhere... Business Continuity Cybersecurity Managed Services NCSAM Oct 22, 2021
Why Every Company Should Have a Better Cybersecurity Culture Cybersecurity is more than just antivirus software and firewalls. All the best cybersecurity technology you can buy is only there to assist the end-user with staying safe. However, if the end-user is ... Business Continuity Cybersecurity NCSAM Training Oct 15, 2021
Make Your Tech Work For You! 'Harmony' has a few definitions, but the most relevant to Lighthouse IT Solutions is both the “pleasing arrangement of parts” and “internal calm.” This is what Lighthouse IT Solutions' Harmony service... Business Continuity Managed Services Feb 5, 2021
Cyber Security Essentials Continuing the discussion on cyber security during this year's National Cybersecurity Awareness Month (NCSAM), we will be talking about the Cybersecurity and Infrastructure Security Agency's (CISA) li... Business Continuity Cybersecurity NCSAM Oct 23, 2020
Cybersecurity Does Not Need to Be Scary! Lighthouse IT hopes you find yourself cyber-safe during this spooky October... Especially considering it's National Cybersecurity Awareness Month! However, if you are worried that you do not know enou... Business Continuity Cybersecurity NCSAM Oct 12, 2019
Inside Secure-IT: Backups and Recovery Welcome to the Inside Secure-IT series of articles. Inspired by a post done by the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our res... Business Continuity Cybersecurity Nov 16, 2018