Urgent/11 and You Many of our clients using Buckeye and Telesystem services received a notice this morning regarding a set of zero-day vulnerabilities known as "Urgent/11" for devices running the VxWorks realtime opera... Cybersecurity News Oct 22, 2019 Lighthouse IT Blog
Cybersecurity Needs to Be Everywhere We hope that you didn't forget about National Cybersecurity Awareness Month ! We wanted to discuss some elements of cybersecurity that you may not be familiar with. Cybersecurity is a lot more than ju... Cybersecurity NCSAM Oct 18, 2019 Lighthouse IT Blog
Cybersecurity Does Not Need to Be Scary! Lighthouse IT hopes you find yourself cyber-safe during this spooky October... Especially considering it's National Cybersecurity Awareness Month! However, if you are worried that you do not know enou... Business Continuity Cybersecurity NCSAM Oct 12, 2019 Lighthouse IT Blog
The Importance of Cybersecurity October is National Cybersecurity Awareness Month (NCSAM)! Now is the perfect time to talk about being safe online! One of the most important things to remember for cyber security is that everyone nee... Cybersecurity NCSAM Training Oct 4, 2019 Lighthouse IT Blog
Windows 7 End of Life Just as everything dies, Windows 7 is reaching it's end of life. It may be sad for some, but Microsoft will no longer be supporting it as of January 14th, 2020. So the question stands, what do you nee... Cybersecurity News Jul 26, 2019 Lighthouse IT Blog
6 Ways We Shield Your Business From Ransomware One of the most frightening and infuriating types of malware out there is known as ransomware. What ransomware does is lock or encrypt the data on a device in order to make it inaccessible and then, a... Cybersecurity Malware Managed Services Mar 15, 2019 Lighthouse IT Blog
Inside Secure-IT: Network Security and Device Protection Welcome to the Inside Secure-IT series of articles. Inspired by a post done by the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our res... Cybersecurity Dec 14, 2018 Lighthouse IT Blog
Inside Secure-IT: User-Based Security and Password Management Welcome to the Inside Secure-IT series of articles. Inspired by an alert from the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our resp... Cybersecurity Dec 7, 2018 Lighthouse IT Blog
Inside Secure-IT: Physical Security Welcome to the Inside Secure-IT series of articles. Inspired by an alert from the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our resp... Cybersecurity Nov 30, 2018 Lighthouse IT Blog
Inside Secure-IT: Backups and Recovery Welcome to the Inside Secure-IT series of articles. Inspired by a post done by the US-CERT at the beginning of October describing the threat posed to MSP's by hackers and other ne'er-do-wells. Our res... Business Continuity Cybersecurity Nov 16, 2018 Lighthouse IT Blog
What is a pop-up and how can I get rid of them? Most people know what a pop-up ad is, but even if you have never heard of one before their description is in the name! And they are just as annoying as they sound... They are advertisements that with ... Cybersecurity Malware Tech Tips Jun 22, 2018 Lighthouse IT Blog
What is a Rootkit? A Rootkit is a piece of malicious software that hides itself on your computer and gives an unauthorized person control of the machine and access to the information on it. It goes without saying that t... Cybersecurity Malware Jun 15, 2018 Lighthouse IT Blog