Lighthouse Technology Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

b2ap3_thumbnail_microsoft_office_vulnerability_400.jpgDoes your office practice proper maintenance and security against the latest threats, like Sandworm and CryptoWall 2.0? You should, or else your business might get a nasty holiday gift in the form of the Schannel vulnerability in Microsoft Office. This particular threat allows a hacker to take over the entire system, making it an exceptionally dangerous vulnerability that you can’t ignore. Thankfully, a patch is available to the general public, so you want to apply it as soon as possible.

b2ap3_thumbnail_laptop_battery_saving_tips_400.jpgA laptop with no power can be a pain, especially when it only lasts a minimal amount of time. Sometimes it feels like you can’t operate at full capacity without leaving your laptop plugged in at all times. Thankfully, you don’t have to suffer from this, and with a little bit of troubleshooting and basic PC maintenance, you can prolong the life of your laptop’s battery significantly.

How Cloud Computing Frees Up Funds for Your Business

Posted by on in Cloud

b2ap3_thumbnail_cloud_savings_400.jpgFrom the perspective of a business owner, spending money on technology is an investment that one hopes to see a return on (ROI). After the initial investment is returned, then all funds generated by the technology are sweet profit--which is the driving goal for every business. One technology that’s the most capable of driving profits for business is cloud computing.

4 Holiday Tech Gifts for 2014

Posted by on in Miscellaneous

b2ap3_thumbnail_2014_gifts_400.jpgThe holidays are again upon us and if you are looking for the perfect gift for your favorite business professional, you don’t have to look too far. There are more consumer electronics available today than ever before, and most of them have some sort of novelty attached to them. We have made a list of four gifts that are not only cool, they serve a practical purpose and will probably avoid being re-gifted or recycled.

Tagged in: Gadgets Holiday Retail

b2ap3_thumbnail_protect_your_network_400.jpgYour company’s network can be very sensitive at times, and even the slightest disruption can cause downtime. Be it an immense natural disaster or something as simple as forgetting your login credentials, it’s common problems which cause the most trouble for businesses. In order to fight against these issues, it’s best to prepare yourself for these three common (and fairly simple) scenarios.

Are You Using Technology Fit for a Museum?

Posted by on in Technology

b2ap3_thumbnail_old_tech_400_20141209-152757_1.jpgWhat’s the technology in your office like? There’s a pretty good chance that at least some of the equipment you’re using may be obsolete. To find out if you’re using any obsolete technologies, let’s take a stroll down the Museum of Obsolete Objects and see what they’ve got on display.

Tip of the Week: How to Find a Missing File

Posted by on in How To

b2ap3_thumbnail_find_a_file_400.jpgWe all have forgetful moments when we misplace things like our car keys and wallet. Sometimes, we can even forget basic things like where we saved an important computer file. Thankfully, Windows understands these moments of forgetfulness and they’ve made it relatively easy for users to find what they’re searching for.

Trust is the Key for BYOD

Posted by on in Business

b2ap3_thumbnail_byod_trust_400.jpgAs mobile technology booms, employers and employees are learning how to best take advantage of using new mobile technology in the workplace (a trend known as BYOD). To be sure, there are several advantages that come with BYOD, but there’s still hesitancy for many businesses to fully adopt mobile technology due to a lack of trust.

b2ap3_thumbnail_workplace_competition_400.jpgBlack Friday is widely regarded as the most competitive day for American retailers, and for consumers standing in line to take advantage of rock-bottom prices, the general consensus is that all of this competition is great for their wallets. In the same way, your business can benefit from a healthy dose of friendly competition.

b2ap3_thumbnail_apt_hackers_are_dangerous_400.jpgHackers come in all shapes and sizes, with varied levels of skills to boot. The generic garden-variety hacker will probably only try to hack your email and send spam, or steal your personal information. However, there are much worse threats out there, like APT hackers. This week, we’ll cover how you can spot these wolves in sheep’s clothing.

Getting a Computer Virus is Like Catching the Flu

Posted by on in Security

b2ap3_thumbnail_under_the_weather_virus_400.jpgGrab your tissues, it’s flu season! Just like biological viruses such as the flu can cripple an entire office, digital viruses can cause a lot of trouble for businesses too. Both downtime-causing virus scenarios can be prevented if proper safety measures are followed, like sanitation and cybersecurity.

Tagged in: Malware Security Virus

b2ap3_thumbnail_future_of_internet_of_things_400.jpgThe Internet of Things is changing the face of web-connected devices as we know it. Some would argue that the world isn’t ready for the IoT, but it’s on its way nonetheless. But what really constitutes the Internet of Things? InfoWorld suggests that a lot of what the public sees as the Internet of Things shouldn’t be classified as IoT devices. Therefore, we need a more substantial definition for this revolutionary phenomenon.

b2ap3_thumbnail_trash_apps_to_improve_performance_400.jpgThere’s a value to having a neat and tidy office where everything is where it’s supposed to be. In addition to seeing a boost in productivity because you’re not having to fight clutter, you just feel good about working in a space that’s clean and orderly. These same principles of organization apply to your company’s network.

b2ap3_thumbnail_reboot_automation_400.jpgIf you were asked to recall the last time you restarted your PC or smartphone, could you? Too many people don’t take the few minutes required to promote quality efficiency and productivity with their machines. In fact, rebooting can be very much like a full night’s sleep for a computer, and without it, its performance might not meet your business’s expectations.

5 Obscure Phone Chargers on the Market

Posted by on in Technology

b2ap3_thumbnail_charge_your_phone_with_these_400.jpgA lot of people have a car charger for their smartphone, and it’s easy to understand why. A smartphone can be the link between you and your business. But did you know that you have a lot of other, more obscure (and more interesting) choices for phone chargers?

b2ap3_thumbnail_filter_content_400.jpgBy now, you’re well aware of the Internet’s Catch 22 nature. Your business needs it so that employees can be equipped to do their jobs, but it can also be a major distraction and kill productivity. For this week’s tip, here are three ways that you can cut back on Internet distractions and maximize productivity.

What do CIOs Really Think of Windows 10?

Posted by on in Technology

b2ap3_thumbnail_opinions_of_windows_10_400.jpgWindows 10, the next big Microsoft’s Windows operating system, has a lot to live up to, and enterprises have had the chance to experiment with the technical preview for the past month. While the operating system will still be in development for the better part of next year, some professionals are forming opinions of what to expect from it. From the technical preview, what do businesses think of Windows 10 so far?

b2ap3_thumbnail_backup_or_disaster_recovery_400.jpgEvery business owner knows how important data backup is to their company's continuity plan, and they realize that a disaster recovery solution can help save them in the event of catastrophe. However, some businesses think they are the same thing, and they are sadly mistaken. While they are similar, a backup is not a disaster recovery solution.

b2ap3_thumbnail_productive_smartphone_400.jpgThere is consistent conversation about the security of your data and the best ways to minimize the risk of losing it. At some point in this conversation the topic of mobile devices comes up. The general consensus is that the more places your staff can access their work, the more they can get done, and how could it not? With smartphones becoming as predominant as coffee mugs, and the nature of mobile devices that have the capability of hopping from one network to the next, how can you ignore that the devices themselves are a data-loss risk?

b2ap3_thumbnail_poodle_ssl_vulnerable_400.jpgA few weeks ago, a new vulnerability was discovered in the Internet Explorer functionality of SSL 3.0. Due to the encompassing nature of the vulnerability, all operating systems are affected. This makes it a big problem that must be resolved. Thankfully, Microsoft has released a fix to the vulnerability, called Fix It, making it far easier to prevent the vulnerability from becoming an issue.

EasyBlog Archive

EasyBlog Tag Cloud

Current Events Business Continuity Streaming Media Avoiding Downtime Security Best Practice User Error Licensing Inbound Marketing Trending Skype Online Currency Crowdfunding Proactive IT Best Practices Display Thank You Spam Gaming Console LinkedIn Marketing Save Time Tablet Mouse Microsoft Customer Relationship Management Net Neutrality Privacy Sports IT Support Law Firm IT Software IT Solutions Virtualization Google Managed Service Provider Quick Tips Data Congratulations iPhone Help Desk People Computer Repair Upgrade Tech Support Phone Systems Hard Drives Social Media Search WiFi Best Available Retail IT Consultant Samsung Wireless Technology Education File Sharing Gadgets eBay 3D Humor Windows 8.1 Update Hosted Solutions Scam Network PC Care Mobile Devices Business Contunuity Statistics Lithium-ion Battery Innovation Health Piracy Tip of the Week Social Networking Smartphones Mobile Office Phone System User Tips Business Computing Downtime Windows Smartphone Microsoft Office Virus Analytics Email PowerPoint Mobile Device Management Printer Excel Vendor Management Touchscreen Hardware Social Android Macro Communication Workplace Tips Internet Holiday Efficiency Wearable Technology Augmented Reality Text Messaging Windows 8 Mobile Computing Conferencing Twitter Web Marketing Office Collaboration The Internet of Things Application Backup Big Data Passwords IT Services Small Business IT Issues Remote Computing Digital Payment Cloud Mobile Money Productivity Going Green Fax Server Webinar Browser Tutorials Apple Users Saving Money Unified Threat Management Operating System Alerts Video Surveillance Computer Accessories Saving Time BYOD Business Management Artificial Intelligence Apps Facebook Content Filtering Leadership Business Information Technology Bring Your Own Device Automation Business Intelligence Programming IBM Company Culture Outlook USB Debate Technology Antivirus Firewall Server Laptop VPN History Point of Sale Maintenance Hackers Memory Managed Service Providers Alert Disaster Recovery Outsourcing Remote Monitoring Disaster Malware Hiring/Firing VoIP Save Money Miscellaneous Tools Bluetooth Computer

Login

Newsletter

Subscribe to our newsletter!
*Email
*Name
*Address

EasyBlog Latest Blogs

Look Out: Critical Microsoft Office Flaw Finally Patched
Security
Does your office practice proper maintenance and security against the latest threats, like Sandworm and CryptoWall 2.0? You should, or else your business might get a nasty holiday gift in the form of ...
Continue Reading...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Lighthouse Technology Solutions!

Read more...

Contact Us

Learn more about what Lighthouse Technology Solutions can do for your business.

callphone

Call us today
703-533-LTSI (5874)

119 Lounsbury Place
Falls Church, Virginia 22046