banner-section
CALL US 402.398.9580

All I want for Christmas, is your identity

Alyssa Sisco
It’s the most wonderful time of the year. Not only for the good-hearted souls searching for the perfect gifts for their loved ones, but also self-serving cyber criminals. They spend their holiday season trying to lure you in with bogus discounts and counterfeit websites. They want you to believe that you finally found the perfect gift at a price you can afford, when really, you just unknowingly gave away your credit card information to be auctioned off on the dark web.
 
As you embark on your holiday shopping journey, keep in mind this list of tips to guard you from accidentally giving a cyber criminal the gift of your identity:
Read More
Topics: Security Threats

7 password security tips to keep yourself safe

Emily Moulder

Passwords have the key to unlock access to our network of friends, work colleagues, and most importantly our bank accounts. It is imperative to keep our passwords private, diverse, and hard to crack. There are cybercriminals out there spending their days finding the codes to peoples digital accounts and gaining access to their most private information.

While most of us think we know all there is about having a secure password, we are not only making it more complicated then it needs to be, but are still making small mistakes that could make our accounts easily accessible to hackers. Read on to learn the 7 tips to keep your digital accounts secure.

Read More
Topics: Security Threats

How to avoid 'smishing,' the latest SMS scam

Emily Moulder

We often get spam messages that are both annoying and dangerous. Cybercriminals are using targets' mobile phones to break into accounts and steal personal information, in so-called 'smishing' attacks. The criminal sends them malicious text messages typically containing a link or a number to call back to in order to obtain private information though a fake but genuine looking message. When a user clicks on the link or calls the number provided in the SMS message, he falls prey to the scam. The practice has been around for a few years, however new scams are mystery shopping invitations that start with a text, and when the user clicks on the link they are roped into shopping fraud, bank account take-over, and even identity theft.  

Read More
Topics: Security Threats

What's so important about software updates?

Lauren Hunter

It can become quite irritating when the little box pops up on your phone, laptop or other device saying you need, yet another software update. You click, "remind me later," and continue on with your day. As irritating as they are, software updates are extremely important and you should get in the habit of following through with those pesky notifications. Why? Read on...

Read More
Topics: Security Threats, The Workplace

What to do BEFORE your identity is stolen...

Lauren Hunter

How is it even possible for someone to steal your identity? Unfortunately, today, it is easy for a criminal to obtain your personal information. After your identity is stolen, not only can the criminal steal your money, they can apply for mortgages, file false medical claims, open lines of credit for fictitious businesses, and so much more. What can you do to protect yourself? Read on...

Read More
Topics: Security Threats, Network Security

How cyber criminals are caught

Lauren Hunter

Every year, there are 80-90 million cyber security incidents. Information is snatched, computers are hacked, money is taken, and identities are stolen. Cyber criminals use phishing, malware, and all other sorts of methods and techniques to obtain data and take money. All of these cyber criminals can't possibly get away with all their crimes, can they? Read more to find out how cyber criminals are put behind bars.

Read More
Topics: Security Threats

Mobile device app security

Lauren Hunter


What mobile device apps do you use on a daily basis? From weather to news to games, mobile devices come with it all. Apps are easy to download, often free, and they are so convenient to download that you might not be thinking of some key security questions before installing that application on your device.

People who would never open an email attachment from a stranger buy apps without considering the possible consequences. You need to watch out for apps that are malicious. Hackers could steal your personal information, others' contact information, or passwords if you download a malicious app. Fortunately, there are several steps you can take so this does not happen to you.
Read More
Topics: Security Threats, Trends

Keep your eyes wide open when it comes to this top 2017 security threat

Angela Wight

Ransomware attacks will double in 2017, and it is important for your business and staff to remain knowledgeable on what to look for. In addition, remaining alert and hesitant to what you click on is important as well. Learning all you can about the malware, what it is, how it gets in, and how to avoid it, will be crucial steps to keeping your data safe.

Read More
Topics: Security Threats

Webcam snooping, it's a thing...

Lauren Hunter

Have you been surfing the internet and felt like you weren't alone? Your intuition may be right. Hackers all over the globe are spying on people through their webcams, and it is creating a huge privacy issue for many people.

Read More
Topics: Security Threats

Destroying your electronic media

Brooke Nielsen
The risks of not properly destroying electronic media, such as computer hard drives, video and audio tapes, etc. can include identity theft, possible HIPAA violations, loss of business reputation and client trust,  and more. Without destruction of these items that are filled with personal and company data, information could be sent to unintended recipients. Individuals, as well as businesses, have confidential information which they don’t want ending up in the wrong hands. Destroying electronic media in the correct manner keeps all data secure so you don’t have to worry about the negative consequences.
 
Your Media is at Risk – All of it!
 
Many people believe computer hard drives are the only electronic media that need to be destroyed. This is not the case. While it is important to properly destroy these devices, there are other items that you will want to take care of as well.
Read More
Topics: Security Threats, Data Breach