Meta's $10B Cable, Telco Trouble, Google Hijacking, & Blueskys Ahead LITS bits: This week, Matt and GriffdiscussMeta's ambitious $10B plan to build a world-spanning undersea fiber-optic cable. The countdown for TikTok continues as the Appeals Court has upheld the decis... Dec 13, 2024 Lighthouse Podcast
Common Mobile Malware Traps Modern smartphones can serve as a communication hub, digital wallet, and personal assistant, all in one portable device. That also means modern smartphones are packed with sensitive data, such as fina... Cybersecurity Malware Dec 11, 2024 Lighthouse Blog
Modern Types of Malware Threats Malicious software, more commonly referred to as malware, are programs designed toinfiltrate and hide within your computer systemandcause harm or steal data. They are usually downloaded without you ev... Cybersecurity Malware Dec 4, 2024 Lighthouse Blog
Palo-Alto Zero-Day, Google’s Legal Battle, Social Media Laws, & more! LITS bits: This week, Matt and Griff discusssecurity vulnerabilities hitting MacOS and iOS devices, both of which have patches, as well as how VMware has confirmed the active exploitation of vulnerabi... Nov 28, 2024 Lighthouse Podcast
Common Cyber Threats and Solutions You have almost assuredly heard before thatcyber threats are constantly evolving, but that's becauseit's true. And every business, regardless of howbig or small they are, is a target. Unfortunately, s... Cybersecurity Malware Nov 27, 2024 Lighthouse Blog
Enhancing Your Email Security Email is one of the most used communication tools for businesses and, by extension, a prime target for cybercriminals. With cyberattacks constantly increasing in sophistication, it is critical to have... Cybersecurity Nov 20, 2024 Lighthouse Blog
Mac Tiny, Walblox, FortiJump, & Wooden Satellites LITS bits: This week, Matt and Griff discuss Apple's updates to the Mac Mini hardware, Walmart is pushing hard towards eCommerce, even going so far as to implement a brand integration into Roblox and ... Nov 15, 2024 Lighthouse Podcast
Data Breach Damage Control Data breaches are a genuine and ever-present risk for all businesses , regardless of size. In the unfortunate event that a breach occurs, a business's immediate response is critical in order to mitiga... Business Continuity Cybersecurity Nov 13, 2024 Lighthouse Blog
Securing Your Software Supply Chain These days, everything’s connected, especially software, including ones your business relies on, whether you’ve installed that software locally or use it in the cloud. Naturally, protecting the proces... Cybersecurity Nov 6, 2024 Lighthouse Blog
Prime Time, Click to Cancel, & Death of Windows 10 LITS bits: This week, Matt and Griff discussthe recent discovery of the largest prime number known to date, and holy cow, it's a big one. Also, do you remember when Windows 10 was going to be Microsof... Nov 1, 2024 Lighthouse Podcast
Important Considerations Before Buying Smart Tech Homes full of smart tech (also called smart homes) can sometimes seem like something straight out of a sci-fi movie, with things like lights that respond to voice commands, thermostats that auto-adjus... Cybersecurity Tech Tips Oct 30, 2024 Lighthouse Blog
Safeguarding Tech While Traveling Most people these days keep their technology with them when they travel. Whether for work, communication, or entertainment, we rely heavily on our devices, but traveling exposes them to various risks ... Cybersecurity Remote Working Tech Tips Oct 23, 2024 Lighthouse Blog