Insider Threats Are Getting More Dangerous! Here’s How to Stop Them

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. Because insiders have authorized system access, they bypass certain security defenses. Such as those designed […]

Insider Threats Are Getting More Dangerous! Here’s How to Stop Them

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. Because insiders have authorized system access, they bypass certain security defenses. Such as those designed […]

Checklist for Better Digital Off-Boarding of Employees

Digital footprints cover today’s modern workplace. Employees begin making these the moment they’re hired. They get a company email address and application logins. They may even update their LinkedIn page to connect to your company. When an employee leaves a company, there is a process that needs to happen. This is the process of “decoupling” […]

The Top 5 Cybersecurity Mistakes

The global damage of cybercrime has risen to an average of $11 million USD per minute, which is a cost of $190,000 each second. 60% of small and mid-sized companies that have a data breach end up closing their doors within six months because they can’t afford the costs. The costs of falling victim to […]

How Often Do You Need to Train Employees on Cybersecurity Awareness?

You’ve completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is until about 5-6 months later. Your company suffers a costly ransomware infection due to a click on a phishing link. You wonder why you seem to need to train on the same information […]

Are Two Monitors Really More Productive Than One?

https://www.pexels.com/photo/silver-imac-on-top-of-brown-wooden-table-326502/ When you see those people with two monitors, you may assume they do some specialized work that requires all that screen space, or they just really like technology. But having the additional display real estate that a second screen provides can benefit anyone, even if you’re doing accounting or document work all day. We […]

4 Things to Know About Ransomware Attacks in 2021

Ransomware Attacks

In today’s technological world, it’s likely you’ve heard about ransomware attacks. If you’re not up to speed, ransomware is a type of malware that is usually disguised as an innocent email or link, but once activated, encrypts files and makes the system unusable. The malicious actors behind the ransomware then will demand a ransom in […]

Emerging Cybersecurity Trends to Watch in Second Half of 2021

cybersecurity trends

The technology landscape is ever-changing, and within the last year there is no doubt the reliance on technology has brought about many innovations, as well as hurdles. No one could have predicted the impact the pandemic had on technology, and how once again, the landscape shifted. In this blog, we are going to review the emerging threat landscape that has resulted over […]

Microsoft Exchange Servers Hacked by Hafnium

Microsoft Exchange Servers Hacked by Hafnium If your company subscribes to Microsoft 365 or Exchange Online, rest easy. You are safe. (This includes all Lighthouse Technology Partners customers.) According to Microsoft, thousands of other self-managed small businesses’ Exchange Mail Servers were breached. This was discovered last Tuesday. Microsoft minimized the hacking attacks, which took advantage of […]