banner-section
CALL US 402.398.9580

Mobile device app security

Lauren Hunter


What mobile device apps do you use on a daily basis? From weather to news to games, mobile devices come with it all. Apps are easy to download, often free, and they are so convenient to download that you might not be thinking of some key security questions before installing that application on your device.

People who would never open an email attachment from a stranger buy apps without considering the possible consequences. You need to watch out for apps that are malicious. Hackers could steal your personal information, others' contact information, or passwords if you download a malicious app. Fortunately, there are several steps you can take so this does not happen to you.
Read More
Topics: Security Threats, Trends

Keep your eyes wide open when it comes to this top 2017 security threat

Angela Wight

Ransomware attacks will double in 2017, and it is important for your business and staff to remain knowledgeable on what to look for. In addition, remaining alert and hesitant to what you click on is important as well. Learning all you can about the malware, what it is, how it gets in, and how to avoid it, will be crucial steps to keeping your data safe.

Read More
Topics: Security Threats

Webcam snooping, it's a thing...

Lauren Hunter

Have you been surfing the internet and felt like you weren't alone? Your intuition may be right. Hackers all over the globe are spying on people through their webcams, and it is creating a huge privacy issue for many people.

Read More
Topics: Security Threats

Destroying your electronic media

Brooke Nielsen
The risks of not properly destroying electronic media, such as computer hard drives, video and audio tapes, etc. can include identity theft, possible HIPAA violations, loss of business reputation and client trust,  and more. Without destruction of these items that are filled with personal and company data, information could be sent to unintended recipients. Individuals, as well as businesses, have confidential information which they don’t want ending up in the wrong hands. Destroying electronic media in the correct manner keeps all data secure so you don’t have to worry about the negative consequences.
 
Your Media is at Risk – All of it!
 
Many people believe computer hard drives are the only electronic media that need to be destroyed. This is not the case. While it is important to properly destroy these devices, there are other items that you will want to take care of as well.
Read More
Topics: Security Threats, Data Breach

Watch out for fake smartphone apps

Wynn Obermeyer
The holidays are here and the scammers are out in full force. Their latest trick involves fake apps. Starbucks started the first "retail app", and many retailers have followed their lead.
 
But scammers are now creating fake apps, tricking you into downloading them to your smartphone or tablet, and then they ask you to load your credit card information into these apps.  You can guess what happens next and it is not good.
 
Here are 5 things to think about:

1. Be very cautious in deciding what apps to download to your smartphone or tablet. Better safe than sorry.
Read More
Topics: Security Threats

Don't let cybercriminals cash in on your business this holiday

Angela Wight
Yes, it’s a wonderful time of year! The holiday spirit abounds—time with family, friends and special events. And yet, for businesses it’s also a time to watch out for criminals looking to take advantage of vulnerabilities at the holidays.

Some security basics to implement now:
 
1. Warn employees to watch out for phishing scams, fake-outs, phony websites, and malicious ads.

There are all sorts of phishing emails this time of year. Seemingly coming from UPS, FedEx, USPS, or other legitimate companies, the email links lead you to places with malware or a phony website trying to collect personal or financial information.  Take a look at our past blog post which trains you on how to identify phishing emails: The anatomy of a phishing email.
Read More
Topics: Security Threats

Ward off intrusions with two-factor authentication

Wynn Obermeyer

I recently came across a website with some great information on two-factor authentication (also known as 2FA or TFA). You've more than likely experienced two-factor authentication at one time or another when logging into a Microsoft or Google account, and yet, should you consider it for your business? Yes, definitely. 

 

Protecting your business

Although an additional security step in the login process, two-factor authentication is quick and worth it. Two-factor authentication is being widely adopted because it contributes to more secure systems at the network and desktop level. 

Read More
Topics: Security Threats

6 reasons to train your staff on security basics

Chris Vilim
Owner to owner, I have some advice for you…stepping up training on security basics is one of the most important training sessions you can send your staff to this year. And here are the six strong reasons why…
 
1. Speed up recovery time and save money

You are not only avoiding security threats by training your employees on the importance of security, you’re also providing them with the knowledge of what to do if their system becomes compromised. For example, if an employee makes the mistake of clicking on an email containing malware, the chances of them realizing their error quickly and contacting IT support staff greatly increases. By taking this step right away, the amount of damage done is generally less compared to what it might have been had they waited to call.
 
Read More
Topics: Staff Training, Security Threats

Does your Omaha business need a firewall?

Vee Figueroa
Do you lock your front door?

I assume your answer is yes. Just as you lock your front door to keep intruders out and your valuables in, you should do the same to keep your company’s data secure. Your company’s version of a deadbolt is called a firewall and it is one of the best ways to keep your data safe.

What is a firewall?

A firewall is a security system that monitors incoming and outgoing network traffic and controls. It permits or blocks traffic based on predetermined security rules.
Firewalls come in various levels of sophistication. A simple and inexpensive firewall will include basic intrusion protection, however may not be adequate for a corporate office, education system, or health care provider. The level of protection may need to be great for these organizations. A very basic firewall that you would purchase for your home device is not the same security you would want for your business. Additionally, a firewall can be a hardware device, a software program, or a combination of the two. 
Read More
Topics: Security Threats

Why criminals target small businesses

Brooke Nielsen
As a small to midsize business (SMB), cybercriminals would never take interest in our organization, right? – Wrong!

In recent years, smaller businesses have become the focal point of hackers interests. In fact, just last year it was reported that 43% of worldwide cyber attacks were against small businesses with less than 250 employees. These attacks usually involve hack attacks, ransomware, denial of service attack, or CEO fraud.

With fewer day-to-day operations and smaller pay offs than larger corporations, why would these bullies waste their time attacking here? Many cyber criminals are centering their attacks based on a business’s valuable data, not necessarily the size or amount of profits the company has. They also look at larger enterprises as being better defended, thus harder to hack. In short, they target SMBs because they are easy, more attractive targets.

Let’s review 5 reasons why criminals are attracted to attacking small to midsize businesses.
Read More
Topics: Security Threats, Data Breach