banner-section
CALL US 402.398.9580

3 security approaches every small business needs

Bill Weber

Hackers are constantly honing their skills and becoming more dangerous, putting your small business at risk. The standard level of prevention from the past is not enough to protect all technology users today. Avoiding ransomware and phishing emails boils down to three basic approaches:

  1. Good cyber awareness and end-user training
  2. Following desktop best practices
  3. Routine testing of backup and recovery plans
Read on and we'll cover how your business needs to prepare so that you may avoid and minimize a security breach which impacts your business flow. 


Read More

10 tips for tightening the financial controls of your business

Alyssa Sisco

Recently, it has come to light that Save the Children Federation was swindled into wiring $1 million to cybercriminals. The money was allegedly going to buy solar panels for health centers in Pakistan, which is well within the scope of the organization’s standard operations. Unfortunately, the transaction was not uncovered as fraudulent until a month after it occurred, thus they were unable to stop the cybercriminals from making off with the funds.

Read More
Topics: Staff Training, Security Threats, Owners & Managers

5 tech tips to keep your business safe through the Midwestern winter

Alyssa Sisco

Today is the official first day of winter! As nice as it sounds to get all wrapped up in blankets with a warm drink and wait out the next few months, we have things to accomplish! But unsurprisingly, Nebraska winter weather isn’t always on board with our plans. Sometimes it’s the snow, other times the ice, and occasionally even a power outage can get in our way. So, let’s get your business prepared for the unpredictability of winter in the Midwest, now!

Read More
Topics: Owners & Managers, The Workplace

7 lessons I learned from my smartphone password fiasco

Dianne Porr

Several years ago, I took part in the mass migration from flip phone to iPhone. I was excited but apprehensive, as I knew there was a lot to learn. At set-up I encountered my first hurdle - I didn't know where to start. My first mistake was asking a friend for help instead of going to support. My friend was more than happy to help, but when trying to create an Apple ID, the phone stated that my home email address was already taken and therefore, unavailable for me to use. Now, instead of looking into why my email address was already in use, I obtained help from another friend and a new email address was created for me. Previously, I never needed an email address for identification, so I didn't think it would be a necessary to hold onto these new credentials. Anyway, I only used the phone for texting, calling and emailing, so it was no big deal.

Read More
Topics: Staff Training

Keeping your systems safe with Duo multifactor authentication

Tim Albertus

With today’s cutting-edge cybercriminals, it's always better to be safe rather than sorry. Hackers have been getting sneakier when it comes to gaining access to one’s system. They not only use brute force attacks or dictionary attacks but also search social media profiles for information you would be likely to use as a password (it is unwise to use personal information as part of your passwords). This is where a secondary authentication method comes into play. Dual authentication, or multifactor authentication (MFA), provides a way to confirm that it's you attempting to gain access to the system.

Read More
Topics: Network Security

Meet the Team: Barry Stackhouse

Alyssa Sisco

Say hello to Barry! As an IT Manager, he is responsible for overseeing the technology needs of a handful of clients. He manages tickets and projects for his clients and provides support and services when they affect a larger group of users or a business as a whole. Barry and his wife have four kids themselves and a very large extended family. They recently hosted Thanksgiving at their house for more than 50 people! For some more interesting facts about Barry, check out his video!

Read More
Topics: Our Company

Monitor internal threats with Cyber Hawk

Alyssa Sisco

Let’s say you eat healthy, exercise, drink water, get eight hours of sleep every night, take vitamins and get your flu shot. Can you be 100% certain that you’re not going to get the flu this year? No. But each step you take towards being healthy, strengthens your immune system and lowers your risk of getting sick. In IT, we call this a layered approach. There is no one tool you can use to guarantee your business’s safety from a cyber-attack, but you can take multiple tools and put them together in a way that creates a strong defense. If a hacker is able to get past one of your layers of defense, they should be stopped by the next layer of security. Many of today’s internal security threats can’t be prevented simply by a firewall or antivirus.

Read More
Topics: Network Security

The risks of unpatched applications and unsupported equipment

Alyssa Sisco

Everyday more technology processes are automated, saving us from performing tedious tasks over and over. However, the technology that helps us and makes our lives easier is also used by hackers and cybercriminals to take advantage of us. Hackers use automation to build bots that continuously search the internet for unpatched and vulnerable devices to infect. In fact, almost 30% of all internet traffic is made up of bad bots such as hacking tools, impersonators, scrapers and spammers. Once a hacker finds and accesses your vulnerable computer, it only takes about 20 minutes to infect it. As soon as that one device on your network is infected, it doesn't take long before your whole network is breached.

Read More
Topics: Security Threats, Data Breach, Equipment Purchases, Network Security

Why do I need to restart my computer?

Barry Stackhouse

Just thinking of the possibility of having to shut down your computer can stress some people out. Many of us have gotten to the point where we're logged in to several programs, working on multiple assignments at once. Thus, having to restart your computer and start-up/log-in to each application again seems like a lot of work. But what you don't realize is that you're actually wasting more time and causing more problems for yourself by never rebooting your computer.

Read More
Topics: The Workplace, Trends

TOSHIBA phone systems end of life – now what?

Mike Tushner

On March 21, 2017, Authorized Toshiba Dealers received e-mails stating “We regret to inform you, that as part of its continuing global restructuring, Toshiba Corporation has deemed it necessary to wind-down our Telecommunications Systems Division (TSD) business starting immediately.” Toshiba’s 250 dealers, with over 500 offices were stunned, since TSD had operated in the U.S. since 1975 and was in the top 3 market share for small to medium sized business telephone systems for decades. Dealers were told orders could be submitted until May 22nd, providing just a two-month notice of shutting down.

Read More
Topics: Equipment Purchases, Phone Systems