The Dangers of Shadow IT Most companies leave the IT side of their business to the IT department; however, as things become easier and more accessible , Shadow IT grows. But what is it? Shadow IT is defined as IT systems and ... Business Continuity Cybersecurity Managed Services Nov 12, 2021
Preparing and Recovering from a Cyber Attack While you can take many steps to mitigate the risks, there is, unfortunately, no practical way to ensure that you will never become the victim of a malware attack. Because of this, in addition to taki... Business Continuity Cybersecurity NCSAM Oct 29, 2021
The Dangers of BYOD or 'Bring Your Own Device' Bring your own device or BYOD is a business/IT practice where employees use their personal devices to access work systems and data. BYOD is a hotly contested concept in the IT-sphere due to the inhere... Business Continuity Cybersecurity Managed Services NCSAM Oct 22, 2021
Why Every Company Should Have a Better Cybersecurity Culture Cybersecurity is more than just antivirus software and firewalls. All the best cybersecurity technology you can buy is only there to assist the end-user with staying safe. However, if the end-user is ... Business Continuity Cybersecurity NCSAM Training Oct 15, 2021
Make Your Tech Work For You! 'Harmony' has a few definitions, but the most relevant to Lighthouse IT Solutions is both the โpleasing arrangement of partsโ and โinternal calm.โ This is what Lighthouse IT Solutions' Harmony service... Business Continuity Managed Services Feb 5, 2021
Cyber Security Essentials Continuing the discussion on cyber security during this year's National Cybersecurity Awareness Month (NCSAM), we will be talking about the Cybersecurity and Infrastructure Security Agency's (CISA) li... Business Continuity Cybersecurity NCSAM Oct 23, 2020
Cybersecurity Does Not Need to Be Scary! Lighthouse IT hopes you find yourself cyber-safe during this spooky October... Especially considering it's National Cybersecurity Awareness Month! However, if you are worried that you do not know enou... Business Continuity Cybersecurity NCSAM Oct 12, 2019
Inside Secure-IT: Backups and Recovery Welcome to the Inside Secure-IT series of articles. Inspired by a post done by the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our res... Business Continuity Cybersecurity Nov 16, 2018
Cloud-to-Cloud Backup - Safer, smarter and more secure Small Businesses Are at the Front Lines in an Almost Constant Attack of Hackers. These Companies Cannot Afford Downtime. As we move into the information era, data becomes a foundational element of bus... Business Continuity Cybersecurity Apr 27, 2018
The Ultimate Disaster Recovery Checklist Stay One Step Ahead of Potential Disasters Prepare yourself before disaster strikes. When it comes to data backup and disaster recovery (BDR), being prepared for potential disasters is key to keep you... Business Continuity Cybersecurity Mar 30, 2018
Backups & Business Continuity. What's the difference? What would happen to your business if it lost all its data? What is Business Continuity? More and more our businesses depend on data. Data that is primarily stored electronically โ and why wouldn't we... Business Continuity Cybersecurity Sep 19, 2017