Phishing, Spear-phishing, and NCSAM 2022 It's NCSAM! That means we want to get the word out about some of the most common methods hackers use to target people! And phishing is for sure a hacker's most effective tool. It is their primary meth... Cybersecurity NCSAM Oct 7, 2022 Lighthouse Blog
Multi-Factor Authentication and NCSAM 2022! Once again, we find ourselves in October, and for us, it's also known as National Cybersecurity Awareness Month! (NCSAM) It's a time when we all work together to help increase public awareness of cybe... Cybersecurity NCSAM Sep 30, 2022 Lighthouse Blog
Printer Cyber-Security Everyone is aware of the threat that hackers pose. In this digital age, it makes sense that criminals are working over the internet to break into private networks and steal data and control. Naturally... Cybersecurity Apr 15, 2022 Lighthouse Blog
The Goals of a Hacker In 'The Art of War,' Sun Tzu said, "If you know the enemy and know yourself, you need not fear the result of a hundred battles." You could say that cyber-security developers and hackers are at war wit... Cybersecurity Apr 1, 2022 Lighthouse Blog
Mobile Device Cyber-Security The convenience and efficiencies that the rise of mobile devices has brought about are indisputable. However, despite the increase in mobile device reliance, their security has not kept the same pace ... Business Continuity Cybersecurity Mar 18, 2022 Lighthouse Blog
The Dangers of Shadow IT Most companies leave the IT side of their business to the IT department; however, as things become easier and more accessible , Shadow IT grows. But what is it? Shadow IT is defined as IT systems and ... Business Continuity Cybersecurity Managed Services Nov 12, 2021 Lighthouse Blog
What is Ransomware as a Service? (RaaS) Ransomware continues to grow, not only as one of the most popular forms of malware but also as one of the largest industries in the world. And no small part of this growth is due to the rise of ransom... Cybersecurity Malware Nov 5, 2021 Lighthouse Blog
Preparing and Recovering from a Cyber Attack While you can take many steps to mitigate the risks, there is, unfortunately, no practical way to ensure that you will never become the victim of a malware attack. Because of this, in addition to taki... Business Continuity Cybersecurity NCSAM Oct 29, 2021 Lighthouse Blog
The Dangers of BYOD or 'Bring Your Own Device' Bring your own device or BYOD is a business/IT practice where employees use their personal devices to access work systems and data. BYOD is a hotly contested concept in the IT-sphere due to the inhere... Business Continuity Cybersecurity Managed Services NCSAM Oct 22, 2021 Lighthouse Blog
Why Every Company Should Have a Better Cybersecurity Culture Cybersecurity is more than just antivirus software and firewalls. All the best cybersecurity technology you can buy is only there to assist the end-user with staying safe. However, if the end-user is ... Business Continuity Cybersecurity NCSAM Training Oct 15, 2021 Lighthouse Blog
Phishing Scams in 2021 We are now in week two of National Cybersecurity Awareness Month. And this week has an important theme, "Fight the Phish!" We have talked about phishing before , and this won't be the last time we tal... Cybersecurity NCSAM Oct 8, 2021 Lighthouse Blog
Types of Cybersecurity Threats to Worry About October is National Cybersecurity Awareness Month! We here at Lighthouse IT Solutions will once again be joining to raise awareness of digital threats and offer knowledge on how to protect yourself fr... Cybersecurity Malware NCSAM Oct 1, 2021 Lighthouse Blog