Lighthouse Technology Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

b2ap3_thumbnail_future_of_internet_of_things_400.jpgThe Internet of Things is changing the face of web-connected devices as we know it. Some would argue that the world isn’t ready for the IoT, but it’s on its way nonetheless. But what really constitutes the Internet of Things? InfoWorld suggests that a lot of what the public sees as the Internet of Things shouldn’t be classified as IoT devices. Therefore, we need a more substantial definition for this revolutionary phenomenon.

b2ap3_thumbnail_trash_apps_to_improve_performance_400.jpgThere’s a value to having a neat and tidy office where everything is where it’s supposed to be. In addition to seeing a boost in productivity because you’re not having to fight clutter, you just feel good about working in a space that’s clean and orderly. These same principles of organization apply to your company’s network.

b2ap3_thumbnail_reboot_automation_400.jpgIf you were asked to recall the last time you restarted your PC or smartphone, could you? Too many people don’t take the few minutes required to promote quality efficiency and productivity with their machines. In fact, rebooting can be very much like a full night’s sleep for a computer, and without it, its performance might not meet your business’s expectations.

5 Obscure Phone Chargers on the Market

Posted by on in Technology

b2ap3_thumbnail_charge_your_phone_with_these_400.jpgA lot of people have a car charger for their smartphone, and it’s easy to understand why. A smartphone can be the link between you and your business. But did you know that you have a lot of other, more obscure (and more interesting) choices for phone chargers?

b2ap3_thumbnail_filter_content_400.jpgBy now, you’re well aware of the Internet’s Catch 22 nature. Your business needs it so that employees can be equipped to do their jobs, but it can also be a major distraction and kill productivity. For this week’s tip, here are three ways that you can cut back on Internet distractions and maximize productivity.

What do CIOs Really Think of Windows 10?

Posted by on in Technology

b2ap3_thumbnail_opinions_of_windows_10_400.jpgWindows 10, the next big Microsoft’s Windows operating system, has a lot to live up to, and enterprises have had the chance to experiment with the technical preview for the past month. While the operating system will still be in development for the better part of next year, some professionals are forming opinions of what to expect from it. From the technical preview, what do businesses think of Windows 10 so far?

b2ap3_thumbnail_backup_or_disaster_recovery_400.jpgEvery business owner knows how important data backup is to their company's continuity plan, and they realize that a disaster recovery solution can help save them in the event of catastrophe. However, some businesses think they are the same thing, and they are sadly mistaken. While they are similar, a backup is not a disaster recovery solution.

b2ap3_thumbnail_productive_smartphone_400.jpgThere is consistent conversation about the security of your data and the best ways to minimize the risk of losing it. At some point in this conversation the topic of mobile devices comes up. The general consensus is that the more places your staff can access their work, the more they can get done, and how could it not? With smartphones becoming as predominant as coffee mugs, and the nature of mobile devices that have the capability of hopping from one network to the next, how can you ignore that the devices themselves are a data-loss risk?

b2ap3_thumbnail_poodle_ssl_vulnerable_400.jpgA few weeks ago, a new vulnerability was discovered in the Internet Explorer functionality of SSL 3.0. Due to the encompassing nature of the vulnerability, all operating systems are affected. This makes it a big problem that must be resolved. Thankfully, Microsoft has released a fix to the vulnerability, called Fix It, making it far easier to prevent the vulnerability from becoming an issue.

Ghost Servers - Who Ya Gonna Call?

Posted by on in Security

b2ap3_thumbnail_ghost_server_400.jpgEveryone has heard horror stories about the spirits of the dead lingering in this world. Every culture on this planet has different beliefs about the nature of these spectral beings. Not much is known about these beings, but people still believe without a doubt that they exist. In regards to technology, ghosts do exist, in the form of ghost servers.

Tagged in: Holiday Security Server

b2ap3_thumbnail_email_tips_for_you_400.jpgEmail is synonymous with doing business in the digital age. Therefore, it's in your best interest to become an expert at crafting dynamic emails. Writing a good email takes common sense and careful editing. You don't have to be an English major to write a professional email--just follow these simple tips.

b2ap3_thumbnail_hoteling_office_trend_400.jpgEveryone is well aware of how mobile technology is changing everything. Therefore, it's a matter of time before we see new tech drastically change the office layout. This is what's happening in forward-thinking offices with a trend called "hoteling." If your business enjoys mobile technology and you want to get the most collaboration out of your staff, then hoteling is right for you.

b2ap3_thumbnail_wipe_your_android_device_400_20141024-151226_1.jpgMobile technology has invaded our very way of life. We don’t leave the house without our mobile phones, and many business owners have their phones integrated to connect with their company’s network. The average user has many different social media applications and others that utilize personal information. What would happen if you lost it?

Alert: Cryptowall 2.0 Ransomware On the Loose

Posted by on in Alerts

b2ap3_thumbnail_alert_cryptwall_400.jpgThe latest threats can put a damper on your business plan and put your company at risk. Therefore, it's only natural to protect yourself from them. This new threat in particular, Cryptowall 2.0, has the potential to do plenty of heavy-duty damage to your business's network, if given the opportunity.

Tagged in: Alert Hackers Malware

b2ap3_thumbnail_hacker_information_400.jpgHackers are mysterious. Not much is known about them - until they get caught, at least. But until the divine hammer of justice is brought down upon them, they will continue to stalk the shadows and wait for us to unknowingly hand over our personal information. What they don't want you to know is that they generally act according to a few particular variables, and that it is possible to avoid their pitfalls.

b2ap3_thumbnail_microsoft_outlook_400.jpgWhat's your Microsoft Outlook contact list looking like these days? For many busy business owners, their email contacts list is jumbled and unorganized, making it difficult to do something simple like locate needed information. Here are a few tips to help you better organize your Outlook contacts so that you can quickly find what you're looking for.

The Medieval Art of Guilds, IT-Style

Posted by on in Business

b2ap3_thumbnail_it_guilds_400.jpgIn days of old, skilled people of all crafts joined together to improve the quality of their lives and their products. These were called guilds, and they're not unlike small businesses of today; a group of like-minded individuals who come together to make the public's lives easier. Your business is no different, and at Lighthouse Technology Solutions, we understand that.

b2ap3_thumbnail_will_automation_userp_human_workers_400.jpgAutomation is an increasingly sought-after convenience in the workplace, especially when it comes to repetitive tasks. Some professionals foresee a world which has fully automated assembly lines, but most are only concerned about what this can do for their assets. Instead of freeing up menial positions for others to take on more meaningful existences, could automation destroy these jobs completely?

Tip of the Week: How to Prevent IT Equipment Theft

Posted by on in How To

b2ap3_thumbnail_device_theft_400.jpgHow familiar are you with the IT equipment owned by your business? If you don't keep detailed records of your equipment and enact security measures and policies, then you're making it easy for theft to occur. We've written a lot about protecting your business from data theft, but it's equally important that you take precautions to safeguard your stuff.

BadUSB: Theoretical Malware Turned Reality

Posted by on in Security

b2ap3_thumbnail_usb_security_400.jpgWe reported in August that security researcher Karsten Nohl of SR Labs revealed a flaw in USB firmware that cripples the technology beyond repair. At the Black Hat security conference, it was revealed that USB devices of all kinds can be targeted by hidden malware. Nohl refused to release the code used in the research, due to being concerned that it would be used by the wrong hands, but it has been made public anyway, putting the masses at risk.

Tagged in: Malware Security USB

EasyBlog Archive

EasyBlog Tag Cloud

Law Firm IT Point of Sale Application Search Server Microsoft Upgrade Gaming Console Save Time eBay Health VoIP Tech Support Browser Privacy Avoiding Downtime Customer Relationship Management Business Outlook Webinar Efficiency Lithium-ion Battery Windows Operating System Excel Vendor Management Scam Facebook Current Events Going Green Marketing Passwords Workplace Tips Disaster Recovery File Sharing Hiring/Firing IT Solutions Online Currency Content Filtering Mouse Web Marketing Managed Service Provider Office Small Business Debate Business Intelligence Artificial Intelligence Computer Save Money Humor Phone Systems Outsourcing Mobile Computing PC Care Money Social Networking Programming Remote Computing Productivity Streaming Media Mobile Office Virus People Managed Service Providers Hackers Best Practice Licensing Net Neutrality User Error Mobile Tablet Piracy User Tips Touchscreen Hosted Solutions Video Surveillance Wireless Technology Email Business Continuity Microsoft Office Trending IT Issues Printer PowerPoint iPhone Hardware Innovation Virtualization Proactive IT IT Support Phone System Inbound Marketing Business Computing Education Leadership USB Firewall Apple Twitter IT Consultant Business Management Social Media Technology 3D Smartphones Google History Information Technology Antivirus Downtime Data Skype Apps Security Computer Accessories Congratulations Smartphone Spam Miscellaneous VPN IBM Bring Your Own Device Social Backup Sports Fax Server Wearable Technology Alerts Saving Time Mobile Device Management Big Data Conferencing Analytics Thank You Android BYOD Text Messaging Gadgets Bluetooth Best Practices Help Desk Users Communication Cloud Digital Payment Internet Mobile Devices Remote Monitoring IT Services Best Available Memory Macro WiFi Hard Drives Unified Threat Management Quick Tips Company Culture Saving Money Maintenance Business Contunuity Computer Repair Collaboration Statistics Network Tutorials Augmented Reality Holiday Alert Malware Samsung Display Windows 8.1 Update Tools Tip of the Week Software LinkedIn Crowdfunding Windows 8 Automation The Internet of Things

Login

Newsletter

Subscribe to our newsletter!
*Email
*Name
*Address

EasyBlog Latest Blogs

3 Ways the Future of the Internet of Things will Shape Up
Cloud
The Internet of Things is changing the face of web-connected devices as we know it. Some would argue that the world isn’t ready for the IoT, but it’s on its way nonetheless. But what really constitute...
Continue Reading...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Lighthouse Technology Solutions!

Read more...

Contact Us

Learn more about what Lighthouse Technology Solutions can do for your business.

callphone

Call us today
703-533-LTSI (5874)

119 Lounsbury Place
Falls Church, Virginia 22046