banner-section
CALL US 402.398.9580

How to avoid 'smishing,' the latest SMS scam

Emily Moulder

We often get spam messages that are both annoying and dangerous. Cybercriminals are using targets' mobile phones to break into accounts and steal personal information, in so-called 'smishing' attacks. The criminal sends them malicious text messages typically containing a link or a number to call back to in order to obtain private information though a fake but genuine looking message. When a user clicks on the link or calls the number provided in the SMS message, he falls prey to the scam. The practice has been around for a few years, however new scams are mystery shopping invitations that start with a text, and when the user clicks on the link they are roped into shopping fraud, bank account take-over, and even identity theft.  

Read More
Topics: Security Threats

What's so important about software updates?

Lauren Hunter

It can become quite irritating when the little box pops up on your phone, laptop or other device saying you need, yet another software update. You click, "remind me later," and continue on with your day. As irritating as they are, software updates are extremely important and you should get in the habit of following through with those pesky notifications. Why? Read on...

Read More
Topics: Security Threats, The Workplace

What to do BEFORE your identity is stolen...

Lauren Hunter

How is it even possible for someone to steal your identity? Unfortunately, today, it is easy for a criminal to obtain your personal information. After your identity is stolen, not only can the criminal steal your money, they can apply for mortgages, file false medical claims, open lines of credit for fictitious businesses, and so much more. What can you do to protect yourself? Read on...

Read More
Topics: Security Threats, Network Security

How cyber criminals are caught

Lauren Hunter

Every year, there are 80-90 million cyber security incidents. Information is snatched, computers are hacked, money is taken, and identities are stolen. Cyber criminals use phishing, malware, and all other sorts of methods and techniques to obtain data and take money. All of these cyber criminals can't possibly get away with all their crimes, can they? Read more to find out how cyber criminals are put behind bars.

Read More
Topics: Security Threats

Mobile device app security

Lauren Hunter


What mobile device apps do you use on a daily basis? From weather to news to games, mobile devices come with it all. Apps are easy to download, often free, and they are so convenient to download that you might not be thinking of some key security questions before installing that application on your device.

People who would never open an email attachment from a stranger buy apps without considering the possible consequences. You need to watch out for apps that are malicious. Hackers could steal your personal information, others' contact information, or passwords if you download a malicious app. Fortunately, there are several steps you can take so this does not happen to you.
Read More
Topics: Security Threats, Trends

Keep your eyes wide open when it comes to this top 2017 security threat

Angela Wight

Ransomware attacks will double in 2017, and it is important for your business and staff to remain knowledgeable on what to look for. In addition, remaining alert and hesitant to what you click on is important as well. Learning all you can about the malware, what it is, how it gets in, and how to avoid it, will be crucial steps to keeping your data safe.

Read More
Topics: Security Threats

Webcam snooping, it's a thing...

Lauren Hunter

Have you been surfing the internet and felt like you weren't alone? Your intuition may be right. Hackers all over the globe are spying on people through their webcams, and it is creating a huge privacy issue for many people.

Read More
Topics: Security Threats

Destroying your electronic media

Brooke Nielsen
The risks of not properly destroying electronic media, such as computer hard drives, video and audio tapes, etc. can include identity theft, possible HIPAA violations, loss of business reputation and client trust,  and more. Without destruction of these items that are filled with personal and company data, information could be sent to unintended recipients. Individuals, as well as businesses, have confidential information which they don’t want ending up in the wrong hands. Destroying electronic media in the correct manner keeps all data secure so you don’t have to worry about the negative consequences.
 
Your Media is at Risk – All of it!
 
Many people believe computer hard drives are the only electronic media that need to be destroyed. This is not the case. While it is important to properly destroy these devices, there are other items that you will want to take care of as well.
Read More
Topics: Security Threats, Data Breach

Watch out for fake smartphone apps

Wynn Obermeyer
The holidays are here and the scammers are out in full force. Their latest trick involves fake apps. Starbucks started the first "retail app", and many retailers have followed their lead.
 
But scammers are now creating fake apps, tricking you into downloading them to your smartphone or tablet, and then they ask you to load your credit card information into these apps.  You can guess what happens next and it is not good.
 
Here are 5 things to think about:

1. Be very cautious in deciding what apps to download to your smartphone or tablet. Better safe than sorry.
Read More
Topics: Security Threats

Don't let cybercriminals cash in on your business this holiday

Angela Wight
Yes, it’s a wonderful time of year! The holiday spirit abounds—time with family, friends and special events. And yet, for businesses it’s also a time to watch out for criminals looking to take advantage of vulnerabilities at the holidays.

Some security basics to implement now:
 
1. Warn employees to watch out for phishing scams, fake-outs, phony websites, and malicious ads.

There are all sorts of phishing emails this time of year. Seemingly coming from UPS, FedEx, USPS, or other legitimate companies, the email links lead you to places with malware or a phony website trying to collect personal or financial information.  Take a look at our past blog post which trains you on how to identify phishing emails: The anatomy of a phishing email.
Read More
Topics: Security Threats