Lighthouse Technology Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

b2ap3_thumbnail_email_tips_for_you_400.jpgEmail is synonymous with doing business in the digital age. Therefore, it's in your best interest to become an expert at crafting dynamic emails. Writing a good email takes common sense and careful editing. You don't have to be an English major to write a professional email--just follow these simple tips.

b2ap3_thumbnail_hoteling_office_trend_400.jpgEveryone is well aware of how mobile technology is changing everything. Therefore, it's a matter of time before we see new tech drastically change the office layout. This is what's happening in forward-thinking offices with a trend called "hoteling." If your business enjoys mobile technology and you want to get the most collaboration out of your staff, then hoteling is right for you.

b2ap3_thumbnail_wipe_your_android_device_400_20141024-151226_1.jpgMobile technology has invaded our very way of life. We don’t leave the house without our mobile phones, and many business owners have their phones integrated to connect with their company’s network. The average user has many different social media applications and others that utilize personal information. What would happen if you lost it?

Alert: Cryptowall 2.0 Ransomware On the Loose

Posted by on in Alerts

b2ap3_thumbnail_alert_cryptwall_400.jpgThe latest threats can put a damper on your business plan and put your company at risk. Therefore, it's only natural to protect yourself from them. This new threat in particular, Cryptowall 2.0, has the potential to do plenty of heavy-duty damage to your business's network, if given the opportunity.

Tagged in: Alert Hackers Malware

b2ap3_thumbnail_hacker_information_400.jpgHackers are mysterious. Not much is known about them - until they get caught, at least. But until the divine hammer of justice is brought down upon them, they will continue to stalk the shadows and wait for us to unknowingly hand over our personal information. What they don't want you to know is that they generally act according to a few particular variables, and that it is possible to avoid their pitfalls.

b2ap3_thumbnail_microsoft_outlook_400.jpgWhat's your Microsoft Outlook contact list looking like these days? For many busy business owners, their email contacts list is jumbled and unorganized, making it difficult to do something simple like locate needed information. Here are a few tips to help you better organize your Outlook contacts so that you can quickly find what you're looking for.

The Medieval Art of Guilds, IT-Style

Posted by on in Business

b2ap3_thumbnail_it_guilds_400.jpgIn days of old, skilled people of all crafts joined together to improve the quality of their lives and their products. These were called guilds, and they're not unlike small businesses of today; a group of like-minded individuals who come together to make the public's lives easier. Your business is no different, and at Lighthouse Technology Solutions, we understand that.

b2ap3_thumbnail_will_automation_userp_human_workers_400.jpgAutomation is an increasingly sought-after convenience in the workplace, especially when it comes to repetitive tasks. Some professionals foresee a world which has fully automated assembly lines, but most are only concerned about what this can do for their assets. Instead of freeing up menial positions for others to take on more meaningful existences, could automation destroy these jobs completely?

Tip of the Week: How to Prevent IT Equipment Theft

Posted by on in How To

b2ap3_thumbnail_device_theft_400.jpgHow familiar are you with the IT equipment owned by your business? If you don't keep detailed records of your equipment and enact security measures and policies, then you're making it easy for theft to occur. We've written a lot about protecting your business from data theft, but it's equally important that you take precautions to safeguard your stuff.

BadUSB: Theoretical Malware Turned Reality

Posted by on in Security

b2ap3_thumbnail_usb_security_400.jpgWe reported in August that security researcher Karsten Nohl of SR Labs revealed a flaw in USB firmware that cripples the technology beyond repair. At the Black Hat security conference, it was revealed that USB devices of all kinds can be targeted by hidden malware. Nohl refused to release the code used in the research, due to being concerned that it would be used by the wrong hands, but it has been made public anyway, putting the masses at risk.

Tagged in: Malware Security USB

b2ap3_thumbnail_nfl_blackout_sacked_400.jpgAutumn is a time of change and tradition, and perhaps one of the most well-known is the return of football season. Previously, the broadcasting of local NFL games was restricted by the blackout rule, but a recent revocation of the rule could change everything. Whether you are a football fan or not, this decision to revoke the blackout rule could affect future decisions made by the FCC.

b2ap3_thumbnail_windows_10_400.jpgThe news is out; what was previously thought to be Windows 9, codenamed “Threshold,” has been revealed to be Windows 10. While leaks have already shown us quite a bit of what the latest installment of Windows can do, the official reveal goes into more detail about the nature of Windows 10 for enterprises and even common users. First, let’s go over what we already know about the enigmatic new operating system, then we’ll get into the juicy new details.

b2ap3_thumbnail_decisions_400.jpgThe Internet makes marketing your business much easier, but it's not that way for everyone. A restaurant in California has responded to the standard Internet marketing strategy with an out-of-the-box method of its own. David Cerretini, co-owner of the Italian restaurant Botto Bistro, has told his strategy to USA Today; "I want to be the worst restaurant in the San Francisco area!"

b2ap3_thumbnail_get_your_it_in_order_400.jpgEveryone needs a tip occasionally. Therefore, we want to provide our followers with what we like to call, "Tips of the Week." These helpful tidbits are targeted toward helping you understand certain aspects of business technology. For our first tip, we will walk you through how to reorganize your IT infrastructure. For more tips, see our previous blog articles.

b2ap3_thumbnail_alert_bash_bug_400.jpgA new malicious threat in the technical marketplace has just been discovered. The bug, dubbed the Bash bug, or "shellshock," is on the loose for users of Unix-based operating systems, like Linux or Mac OS X. It allows the execution of arbitrary code on affected systems, and could potentially be very dangerous for your business. In fact, CNet is calling it "bigger than Heartbleed."

Tagged in: Alert Malware Security

b2ap3_thumbnail_former_employee_theft_400.jpgAs a business owner, you've probably had the misfortune of letting a valued (or not-so-valued) employee go. The reasons might vary, but one thing is consistent: they're gone, and could potentially use their newfound residual malice to strike your business right where it hurts. How can you prepare yourself against former employees you may have once called "family?"

b2ap3_thumbnail_read_with_spead_400.jpgAs a business leader, you know that you should read more about the latest industry trends and helpful management concepts. How's that going for you? For many business owners, finding time just to run their business is difficult enough, making book reading a luxury. We've found that you can do both by learning how to speed read.

b2ap3_thumbnail_cloud_computing_for_business_400.jpgFor the modern-day business owner, moving to the cloud means to take advantage of the several strategic advantages it offers. Companies no longer have to restrict themselves by relying on physical servers, desktops, or hardware. Most businesses see the value that cloud-based operations can offer them, and they are racing to take advantage of this fairly recent development. In fact, Joe McKendrick of Forbes magazine says that four-out-of-five small businesses will be based in the cloud in the near future.

b2ap3_thumbnail_credit_card_security_400.jpgMajor retailers are having a rough time of it these days concerning the security of their customer's financial information. Last December, Target was hit with malware that compromised 40 million customer credit and debit card accounts, and recently, Home Depot was hit with the same malware. What's a connoisseur of mass-produced boxed goods to do?

Make Dynamic Infographics with Microsoft PowerPoint

Posted by on in How To

b2ap3_thumbnail_powerpoint_for_infographs_400.jpgNot only can Microsoft PowerPoint make great slideshows, it can also make engaging infographics. The latest trend in marketing is fairly simple: Visual content sells. Images and videos are the most popular way to take advantage of this. Infographics can offer your marketing campaign a combination of text and image, allowing your marketing content to be both engaging and informative.

EasyBlog Archive

EasyBlog Tag Cloud

Quick Tips Apple Tip of the Week Text Messaging Digital Payment Smartphone Downtime Virtualization Browser Backup Video Surveillance Mobile Devices Help Desk eBay Upgrade Programming Point of Sale Android VoIP Antivirus Best Practices Office PowerPoint Virus Save Time Remote Computing Phone Systems Efficiency Disaster Recovery Touchscreen File Sharing Microsoft Office Hard Drives Automation Workplace Tips Scam Privacy Mobile Computing Tools Business Conferencing Social Networking Windows Macro Users IT Solutions Windows 8 Communication Information Technology Inbound Marketing IT Consultant Save Money Thank You Business Intelligence Excel Search 3D Artificial Intelligence Content Filtering WiFi Miscellaneous Computer Accessories Current Events Twitter USB Piracy Apps Marketing Server Customer Relationship Management Debate Passwords Phone System Lithium-ion Battery Memory Computer Repair Unified Threat Management Mobile Productivity Net Neutrality Holiday Going Green Data Managed Service Provider Google Windows 8.1 Update Sports Humor Small Business Tablet IT Issues Email Online Currency Printer Analytics Business Computing The Internet of Things Avoiding Downtime Vendor Management Augmented Reality Social Media Security Cloud PC Care Remote Monitoring Big Data Skype Streaming Media Web Marketing Webinar Innovation Law Firm IT Hosted Solutions Microsoft Gaming Console Trending Gadgets Application Company Culture iPhone Business Contunuity Spam Managed Service Providers Business Continuity Technology Samsung LinkedIn Smartphones Statistics User Tips Hackers Maintenance Software Education Mobile Office Social Display Firewall Bluetooth Licensing History Mobile Device Management Computer Collaboration IBM Tutorials VPN IT Services Leadership Saving Time IT Support Alert Best Available Mouse Alerts Outsourcing BYOD Hardware Fax Server People Hiring/Firing Wearable Technology Proactive IT User Error Saving Money Best Practice Crowdfunding Tech Support Outlook Facebook Bring Your Own Device Network Wireless Technology Internet Malware Congratulations Operating System Health Business Management Money

Login

Newsletter

Subscribe to our newsletter!
*Email
*Name
*Address

EasyBlog Latest Blogs

Tip of the Week: How to Make a Good Impression with Your Email
How To
Email is synonymous with doing business in the digital age. Therefore, it's in your best interest to become an expert at crafting dynamic emails. Writing a good email takes common sense and careful ed...
Continue Reading...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Lighthouse Technology Solutions!

Read more...

Contact Us

Learn more about what Lighthouse Technology Solutions can do for your business.

callphone

Call us today
703-533-LTSI (5874)

119 Lounsbury Place
Falls Church, Virginia 22046