Cybersecurity While Traveling Technology has become an integral part of our lives, so it inevitably comes with us when we travel. However, just because you are taking a vacation from work doesn't mean you can take a vacation from ... Cybersecurity Remote Working Jul 5, 2023 Lighthouse Blog
Push-Bombing Cybersecurity One of the most common risks to an organization's cybersecurity is cloud account takeover. Employees frequently have many different systems or cloud apps, each requiring their own login with credentia... Cybersecurity Jun 29, 2023 Lighthouse Blog
Digital Offboarding Checklist Digital footprints cover today's modern workplace. Employees get a company email address, application logins, a company phone extension, and often more. This is good as it allows employees to be integ... Cybersecurity Jun 22, 2023 Lighthouse Blog
Securing Home Network Devices Many people worry about someone hacking their computer, but not many worry about their wireless printer getting breached. Printers are a tool that most individuals use sporadically, such as when they ... Cybersecurity Remote Working Jun 15, 2023 Lighthouse Blog
How to Handle a Hacked Account Online accounts are vulnerable to hacking. It's a baked-in risk when you have a service that is accessible via the internet. If you experience an account hack, it can be shocking, confusing, and infur... Business Continuity Cybersecurity Jun 8, 2023 Lighthouse Blog
App Fatigue The number of apps and web tools employees use regularly continues to increase. Most departments have about 40-60 different digital tools that they use . 71% of employees feel they use so many apps th... Cybersecurity May 24, 2023 Lighthouse Blog
Cybersecurity Insurance Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for large enterprises . It covered things like data processing errors ... Business Continuity Cybersecurity May 18, 2023 Lighthouse Blog
How to Handle Data Privacy Updates With the rise of easily accessible digital data, authorities realized there was a need to protect said data. Thus, the creation of data privacy rules and regulations to address cyber threats. Many org... Cybersecurity May 10, 2023 Lighthouse Blog
Data Privacy Trends in 2023 Data privacy has been a growing requirement ever since the internet age began. So much personal information is stored in and transferred through computer networks that protecting it has become an offi... Cybersecurity May 3, 2023 Lighthouse Blog
Identity Theft Vulnerabilities You wouldn't think a child's toy could lead to a breach of your personal data, but you might be surprised by how common that is. What about your trashcan sitting outside? It might be a treasure trove ... Cybersecurity Apr 27, 2023 Lighthouse Blog
Supply Chain Attack on 3CX: Insights from Mandiant and 3CX's Response Plan In March 2023, cybersecurity firm Mandiant responded to a supply chain attack on 3CX Desktop App software, identifying the initial compromise vector as malicious software downloaded from the "Trading ... Cybersecurity News Apr 26, 2023 Lighthouse Blog
Endpoint Protection Guide Endpoints make up much of a company's network and IT infrastructure. They are a collection of computers, mobile devices, servers, smart gadgets, and other IoT devices that connect to the company netwo... Cybersecurity Apr 13, 2023 Lighthouse Blog