Lighthouse Technology Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

b2ap3_thumbnail_hacker_information_400.jpgHackers are mysterious. Not much is known about them - until they get caught, at least. But until the divine hammer of justice is brought down upon them, they will continue to stalk the shadows and wait for us to unknowingly hand over our personal information. What they don't want you to know is that they generally act according to a few particular variables, and that it is possible to avoid their pitfalls.

b2ap3_thumbnail_microsoft_outlook_400.jpgWhat's your Microsoft Outlook contact list looking like these days? For many busy business owners, their email contacts list is jumbled and unorganized, making it difficult to do something simple like locate needed information. Here are a few tips to help you better organize your Outlook contacts so that you can quickly find what you're looking for.

The Medieval Art of Guilds, IT-Style

Posted by on in Business

b2ap3_thumbnail_it_guilds_400.jpgIn days of old, skilled people of all crafts joined together to improve the quality of their lives and their products. These were called guilds, and they're not unlike small businesses of today; a group of like-minded individuals who come together to make the public's lives easier. Your business is no different, and at Lighthouse Technology Solutions, we understand that.

b2ap3_thumbnail_will_automation_userp_human_workers_400.jpgAutomation is an increasingly sought-after convenience in the workplace, especially when it comes to repetitive tasks. Some professionals foresee a world which has fully automated assembly lines, but most are only concerned about what this can do for their assets. Instead of freeing up menial positions for others to take on more meaningful existences, could automation destroy these jobs completely?

Tip of the Week: How to Prevent IT Equipment Theft

Posted by on in How To

b2ap3_thumbnail_device_theft_400.jpgHow familiar are you with the IT equipment owned by your business? If you don't keep detailed records of your equipment and enact security measures and policies, then you're making it easy for theft to occur. We've written a lot about protecting your business from data theft, but it's equally important that you take precautions to safeguard your stuff.

BadUSB: Theoretical Malware Turned Reality

Posted by on in Security

b2ap3_thumbnail_usb_security_400.jpgWe reported in August that security researcher Karsten Nohl of SR Labs revealed a flaw in USB firmware that cripples the technology beyond repair. At the Black Hat security conference, it was revealed that USB devices of all kinds can be targeted by hidden malware. Nohl refused to release the code used in the research, due to being concerned that it would be used by the wrong hands, but it has been made public anyway, putting the masses at risk.

Tagged in: Malware Security USB

b2ap3_thumbnail_nfl_blackout_sacked_400.jpgAutumn is a time of change and tradition, and perhaps one of the most well-known is the return of football season. Previously, the broadcasting of local NFL games was restricted by the blackout rule, but a recent revocation of the rule could change everything. Whether you are a football fan or not, this decision to revoke the blackout rule could affect future decisions made by the FCC.

b2ap3_thumbnail_windows_10_400.jpgThe news is out; what was previously thought to be Windows 9, codenamed “Threshold,” has been revealed to be Windows 10. While leaks have already shown us quite a bit of what the latest installment of Windows can do, the official reveal goes into more detail about the nature of Windows 10 for enterprises and even common users. First, let’s go over what we already know about the enigmatic new operating system, then we’ll get into the juicy new details.

b2ap3_thumbnail_decisions_400.jpgThe Internet makes marketing your business much easier, but it's not that way for everyone. A restaurant in California has responded to the standard Internet marketing strategy with an out-of-the-box method of its own. David Cerretini, co-owner of the Italian restaurant Botto Bistro, has told his strategy to USA Today; "I want to be the worst restaurant in the San Francisco area!"

b2ap3_thumbnail_get_your_it_in_order_400.jpgEveryone needs a tip occasionally. Therefore, we want to provide our followers with what we like to call, "Tips of the Week." These helpful tidbits are targeted toward helping you understand certain aspects of business technology. For our first tip, we will walk you through how to reorganize your IT infrastructure. For more tips, see our previous blog articles.

b2ap3_thumbnail_alert_bash_bug_400.jpgA new malicious threat in the technical marketplace has just been discovered. The bug, dubbed the Bash bug, or "shellshock," is on the loose for users of Unix-based operating systems, like Linux or Mac OS X. It allows the execution of arbitrary code on affected systems, and could potentially be very dangerous for your business. In fact, CNet is calling it "bigger than Heartbleed."

Tagged in: Alert Malware Security

b2ap3_thumbnail_former_employee_theft_400.jpgAs a business owner, you've probably had the misfortune of letting a valued (or not-so-valued) employee go. The reasons might vary, but one thing is consistent: they're gone, and could potentially use their newfound residual malice to strike your business right where it hurts. How can you prepare yourself against former employees you may have once called "family?"

b2ap3_thumbnail_read_with_spead_400.jpgAs a business leader, you know that you should read more about the latest industry trends and helpful management concepts. How's that going for you? For many business owners, finding time just to run their business is difficult enough, making book reading a luxury. We've found that you can do both by learning how to speed read.

b2ap3_thumbnail_cloud_computing_for_business_400.jpgFor the modern-day business owner, moving to the cloud means to take advantage of the several strategic advantages it offers. Companies no longer have to restrict themselves by relying on physical servers, desktops, or hardware. Most businesses see the value that cloud-based operations can offer them, and they are racing to take advantage of this fairly recent development. In fact, Joe McKendrick of Forbes magazine says that four-out-of-five small businesses will be based in the cloud in the near future.

b2ap3_thumbnail_credit_card_security_400.jpgMajor retailers are having a rough time of it these days concerning the security of their customer's financial information. Last December, Target was hit with malware that compromised 40 million customer credit and debit card accounts, and recently, Home Depot was hit with the same malware. What's a connoisseur of mass-produced boxed goods to do?

Make Dynamic Infographics with Microsoft PowerPoint

Posted by on in How To

b2ap3_thumbnail_powerpoint_for_infographs_400.jpgNot only can Microsoft PowerPoint make great slideshows, it can also make engaging infographics. The latest trend in marketing is fairly simple: Visual content sells. Images and videos are the most popular way to take advantage of this. Infographics can offer your marketing campaign a combination of text and image, allowing your marketing content to be both engaging and informative.

b2ap3_thumbnail_software_licensing_current_400.jpgA business owner must understand the licensing status of their company's software, but this has grown more complicated since the inception of the Internet. If you feel like your employees, or maybe even your corporate culture survives off of pirated software or applications, or stuff you found "for free" online, then your business could potentially suffer from legal issues.

b2ap3_thumbnail_minecraft_class_400.jpgChildren across the world are heading back to school, and their parents breathe a sigh of relief. Instead of playing video games, children can now expand their minds in institutions designed for learning. But, what if a popular video game could teach children how valuable programming is as a real-world skill?

b2ap3_thumbnail_data_center_growth_400.jpgMost of the Internet's data is stored in data centers. Logistically, data centers are a great solution to store ridiculous amounts of data. However, from an environmental perspective, data centers may be doing more harm than good. This, according to a new report by the National Resources Defense Council.

Do We Have the Right to Be Forgotten?

Posted by on in Miscellaneous

b2ap3_thumbnail_right_to_be_forgotten_400.jpgIn Europe, there's a lot of discussion about whether or not citizens have the right to be forgotten, or rather, be forgotten by search engines. According to a May 2014 ruling, search engines must consider requests from the public for removal of content. Not just any content, though; according to ZDNet, the content must be "inadequate, irrelevant, or no longer relevant." As you might guess, this concept is extremely controversial.

Tagged in: Debate Internet Search

EasyBlog Archive

EasyBlog Tag Cloud

Hackers Bluetooth Windows Save Money Apps Alert Licensing Video Surveillance Managed Service Providers Going Green Current Events IT Solutions Phone System Touchscreen Information Technology Samsung Health Augmented Reality Digital Payment Downtime Mouse Business Intelligence Display IT Services Mobile Computing Mobile Devices Social Media Business Continuity Communication Best Practice Webinar Computer Microsoft Business Smartphones Users Business Computing Upgrade Search Business Management User Tips Help Desk WiFi Avoiding Downtime Leadership Wireless Technology Sports Gaming Console Privacy Productivity Memory Office Programming Technology Managed Service Provider Twitter VoIP Crowdfunding Macro VPN Best Practices Big Data Email Net Neutrality Android Inbound Marketing Money Tablet Innovation Social Hiring/Firing Efficiency Security Business Contunuity Google Conferencing Internet Proactive IT Computer Accessories Congratulations Windows 8 Social Networking The Internet of Things Phone Systems Company Culture Cloud Online Currency Antivirus Apple Trending Saving Time Unified Threat Management IT Issues iPhone Artificial Intelligence Best Available Miscellaneous Remote Computing Server Hardware Gadgets Malware Microsoft Office BYOD Point of Sale Disaster Recovery Maintenance Workplace Tips Tools User Error Streaming Media Outsourcing Hard Drives Humor Save Time Content Filtering Text Messaging 3D Mobile Office IT Consultant Virus History Software Law Firm IT Tech Support Virtualization Holiday Skype Mobile Device Management Quick Tips Web Marketing Excel IBM Computer Repair Automation Bring Your Own Device Thank You USB Browser IT Support Scam Operating System Passwords Backup People Spam Remote Monitoring Saving Money Smartphone PowerPoint Analytics Wearable Technology Customer Relationship Management Alerts Fax Server Facebook Firewall Printer Vendor Management LinkedIn Marketing Outlook File Sharing Tutorials PC Care Windows 8.1 Update Application Statistics Data Tip of the Week Small Business eBay Debate Piracy Mobile Education Hosted Solutions Network Lithium-ion Battery

Login

Newsletter

Subscribe to our newsletter!
*Email
*Name
*Address

EasyBlog Latest Blogs

To Understand the Hacker, You Must Become the Hacker
Security
Hackers are mysterious. Not much is known about them - until they get caught, at least. But until the divine hammer of justice is brought down upon them, they will continue to stalk the shadows and wa...
Continue Reading...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Lighthouse Technology Solutions!

Read more...

Contact Us

Learn more about what Lighthouse Technology Solutions can do for your business.

callphone

Call us today
703-533-LTSI (5874)

119 Lounsbury Place
Falls Church, Virginia 22046