banner-section
CALL US 402.398.9580

What can a computer hack really cost you?

Alyssa Sisco

Being the target of a cybercriminal is not a fun experience for anyone, but it’s definitely a lot worse if you don’t have a plan to get back on your feet afterwards. Cybercriminals have caught on to the fact that small and midsize businesses don’t spend as much money on IT security, making them easier targets than large, multimillion-dollar companies. It’s important to note that 62% off all cyber-attacks are carried out on SMBs, according to IBM. Additionally, the National Cyber Security Alliance states that about 60% of SMBs who experience a hack, go out of business within a six-month period after the attack.

Read More
Topics: Security Threats, Data Breach, Network Security

Keeping up with the Spectre and Meltdown vulnerabilities

Alyssa Sisco

This year certainly started off with a bang in the world of tech security. It’s not very often that in this day and age, a processor flaw becomes a substantial headline for mainstream news outlets. But when it impacts basically every computer or smartphone made in the past 15 years and could negatively affect billions of tech users, that’s kind of a big deal. Essentially, in the drive to create faster technology, some design decisions were made that unknowingly left our devices vulnerable to attack. However, do keep in mind, that even though Spectre and Meltdown have such a wide-spread possibility to cause harm, thus far there have been no known malicious exploits of these vulnerabilities.

Read More
Topics: Security Threats, Network Security

Meltdown & Spectre FAQ

Chris Vilim

PDF: Spectre and Meltdown FAQs

Read More
Topics: Security Threats

Is your inbox a crime scene?

Alyssa Sisco

Much like the shiny lures fishermen use to attract their prey, cybercriminals use email attachments or links to try to get you to click through to malicious content. Often using cheap scare tactics, phishing scams will try to induce a quick, panicked response by making you feel like you have something to lose by not clicking on the link. The instant you click, you open yourself up to malware attacks that can cost you financially, technologically, reputationally, and it will definitely eat up time to reverse the damage that was enacted on your device (if you are able to reverse it at all).

Read More
Topics: Staff Training, Security Threats

All I want for Christmas, is your identity

Alyssa Sisco
It’s the most wonderful time of the year. Not only for the good-hearted souls searching for the perfect gifts for their loved ones, but also self-serving cyber criminals. They spend their holiday season trying to lure you in with bogus discounts and counterfeit websites. They want you to believe that you finally found the perfect gift at a price you can afford, when really, you just unknowingly gave away your credit card information to be auctioned off on the dark web.
 
As you embark on your holiday shopping journey, keep in mind this list of tips to guard you from accidentally giving a cyber criminal the gift of your identity:
Read More
Topics: Security Threats

7 password security tips to keep yourself safe

Emily Moulder

Passwords have the key to unlock access to our network of friends, work colleagues, and most importantly our bank accounts. It is imperative to keep our passwords private, diverse, and hard to crack. There are cybercriminals out there spending their days finding the codes to peoples digital accounts and gaining access to their most private information.

While most of us think we know all there is about having a secure password, we are not only making it more complicated then it needs to be, but are still making small mistakes that could make our accounts easily accessible to hackers. Read on to learn the 7 tips to keep your digital accounts secure.

Read More
Topics: Security Threats

How to avoid 'smishing,' the latest SMS scam

Emily Moulder

We often get spam messages that are both annoying and dangerous. Cybercriminals are using targets' mobile phones to break into accounts and steal personal information, in so-called 'smishing' attacks. The criminal sends them malicious text messages typically containing a link or a number to call back to in order to obtain private information though a fake but genuine looking message. When a user clicks on the link or calls the number provided in the SMS message, he falls prey to the scam. The practice has been around for a few years, however new scams are mystery shopping invitations that start with a text, and when the user clicks on the link they are roped into shopping fraud, bank account take-over, and even identity theft.  

Read More
Topics: Security Threats

What's so important about software updates?

Lauren Hunter

It can become quite irritating when the little box pops up on your phone, laptop or other device saying you need, yet another software update. You click, "remind me later," and continue on with your day. As irritating as they are, software updates are extremely important and you should get in the habit of following through with those pesky notifications. Why? Read on...

Read More
Topics: Security Threats, The Workplace

What to do BEFORE your identity is stolen...

Lauren Hunter

How is it even possible for someone to steal your identity? Unfortunately, today, it is easy for a criminal to obtain your personal information. After your identity is stolen, not only can the criminal steal your money, they can apply for mortgages, file false medical claims, open lines of credit for fictitious businesses, and so much more. What can you do to protect yourself? Read on...

Read More
Topics: Security Threats, Network Security

How cyber criminals are caught

Lauren Hunter

Every year, there are 80-90 million cyber security incidents. Information is snatched, computers are hacked, money is taken, and identities are stolen. Cyber criminals use phishing, malware, and all other sorts of methods and techniques to obtain data and take money. All of these cyber criminals can't possibly get away with all their crimes, can they? Read more to find out how cyber criminals are put behind bars.

Read More
Topics: Security Threats