Electronic Funds Transfer (EFT) Scams Many companies have experienced phishing scams in which a hacker (claiming to be a contractor) requests a change in bank accounts. They end up stealing funds and even make phony calls demonstrating kn... Cybersecurity Nov 21, 2019
Could Multi-factor Authentication really be that good? Chances are that you have heard about the factors of making a strong password , like how the longer it is the better and how the use of upper-case and lower-case letters, numbers, and symbols protects... Cybersecurity NCSAM Oct 24, 2019
Urgent/11 and You Many of our clients using Buckeye and Telesystem services received a notice this morning regarding a set of zero-day vulnerabilities known as "Urgent/11" for devices running the VxWorks realtime opera... Cybersecurity News Oct 21, 2019
Cybersecurity Needs to Be Everywhere We hope that you didn't forget about National Cybersecurity Awareness Month ! We wanted to discuss some elements of cybersecurity that you may not be familiar with. Cybersecurity is a lot more than ju... Cybersecurity NCSAM Oct 17, 2019
Cybersecurity Does Not Need to Be Scary! Lighthouse IT hopes you find yourself cyber-safe during this spooky October... Especially considering it's National Cybersecurity Awareness Month! However, if you are worried that you do not know enou... Business Continuity Cybersecurity NCSAM Oct 11, 2019
The Importance of Cybersecurity October is National Cybersecurity Awareness Month (NCSAM)! Now is the perfect time to talk about being safe online! One of the most important things to remember for cyber security is that everyone nee... Cybersecurity NCSAM Training Oct 3, 2019
Windows 7 End of Life Just as everything dies, Windows 7 is reaching it's end of life. It may be sad for some, but Microsoft will no longer be supporting it as of January 14th, 2020. So the question stands, what do you nee... Cybersecurity News Jul 25, 2019
6 Ways We Shield Your Business From Ransomware One of the most frightening and infuriating types of malware out there is known as ransomware. What ransomware does is lock or encrypt the data on a device in order to make it inaccessible and then, a... Cybersecurity Malware Managed Services Mar 14, 2019
Inside Secure-IT: Network Security and Device Protection Welcome to the Inside Secure-IT series of articles. Inspired by a post done by the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our res... Cybersecurity Dec 13, 2018
Inside Secure-IT: User-Based Security and Password Management Welcome to the Inside Secure-IT series of articles. Inspired by an alert from the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our resp... Cybersecurity Dec 6, 2018
Inside Secure-IT: Physical Security Welcome to the Inside Secure-IT series of articles. Inspired by an alert from the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our resp... Cybersecurity Nov 29, 2018
Inside Secure-IT: Backups and Recovery Welcome to the Inside Secure-IT series of articles. Inspired by a post done by the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our res... Business Continuity Cybersecurity Nov 15, 2018