banner-section
CALL US 402.398.9580

Destroying your electronic media

Brooke Nielsen
The risks of not properly destroying electronic media, such as computer hard drives, video and audio tapes, etc. can include identity theft, possible HIPAA violations, loss of business reputation and client trust,  and more. Without destruction of these items that are filled with personal and company data, information could be sent to unintended recipients. Individuals, as well as businesses, have confidential information which they don’t want ending up in the wrong hands. Destroying electronic media in the correct manner keeps all data secure so you don’t have to worry about the negative consequences.
 
Your Media is at Risk – All of it!
 
Many people believe computer hard drives are the only electronic media that need to be destroyed. This is not the case. While it is important to properly destroy these devices, there are other items that you will want to take care of as well.
Read More
Topics: Security Threats, Data Breach

HIPAA compliance is serious business

Frank Hannaford

The government rules and regulations shaped by the Health Insurance Portability and Accountability Act (HIPAA) are continuing to evolve, which can make compliance difficult to measure.

Agencies in charge of compliance oversight and enforcement have ramped up enforcement over time knowing it was going to take a lot of time, both to develop the rules and regulations, and to circulate them throughout the health care industry.

We have now reached the point where compliance expectations are high and oversight and enforcement is taken seriously, as evidenced by the following article from “Medicare Compliance Watch,” dated October 21, 2016:

Read More
Topics: Data Breach

Why criminals target small businesses

Brooke Nielsen
As a small to midsize business (SMB), cybercriminals would never take interest in our organization, right? – Wrong!

In recent years, smaller businesses have become the focal point of hackers interests. In fact, just last year it was reported that 43% of worldwide cyber attacks were against small businesses with less than 250 employees. These attacks usually involve hack attacks, ransomware, denial of service attack, or CEO fraud.

With fewer day-to-day operations and smaller pay offs than larger corporations, why would these bullies waste their time attacking here? Many cyber criminals are centering their attacks based on a business’s valuable data, not necessarily the size or amount of profits the company has. They also look at larger enterprises as being better defended, thus harder to hack. In short, they target SMBs because they are easy, more attractive targets.

Let’s review 5 reasons why criminals are attracted to attacking small to midsize businesses.
Read More
Topics: Security Threats, Data Breach

BEC fraud: The threat you can't afford to ignore

Brooke Nielsen
Business E-mail Compromise (BEC), commonly known as “CEO fraud,” is a rapidly increasing concern affecting companies’ financial and data security today.

What exactly is BEC? It has been defined as a scam that targets businesses working with foreign suppliers and/or businesses that regularly use wire transfer payments. Scammers skillfully gain access to and impersonate company executives, attorneys, or suppliers through e-mails to fraudulently authorize the transfer of company funds. Payments are then wire transferred from their victims to foreign banks where they are quickly dispersed to the scamming party.

With so many businesses being affected, including The Scoular Co., one of Omaha’s largest companies, it is important to educate yourself and your employees about BEC.
Read More
Topics: Staff Training, Security Threats, Data Breach

The increasing cost of a data breach

Tom Montgomery

We hear about hacking and compromised information at large organizations, yet what is the impact to small and midsize businesses (SMBs)? The article below provides insight on the impact a data breach may have on a business. In addition to citing the increasing costs of data breaches, there are a number of other factors listed which SMBs need to consider the impact of as well.

Read More
Topics: Security Threats, Data Breach