blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Why Your Omaha SMB Should Be Conducting Phishing Email Simulations

Kaitlin Schneider
We’ve all heard that COVID-19 phishing scams have seen a sharp uptick in the past few months. That fact itself may not be surprising, considering cyber criminals ramp up their activity anytime major events happen. However, the actual statistics behind the frequency of recent phishing attacks are jaw-dropping.
Read More
Topics: Staff Training, Security Threats, Local Omaha News

How to Keep Business Data Secure While Employees Work from Home

Chris Vilim
Securing your company’s data while your employees are working on the other side of the corporate firewall requires investing in the right tools, establishing clear guidelines and training your staff to take initiative in matters of cyber security. You may feel as though you have less control over your data during this challenging time, but with the help of a managed services provider (MSP), you can protect your company from disastrous data breaches. Here are the basics of keeping your data safe ...
Read More
Topics: Security Threats, Network Security

4 Elements of an Effective Cyber Security Awareness Training Program

Kaitlin Schneider
Your employees likely already know that they play a critical role in protecting company data assets, and that failing to uphold that responsibility can have disastrous consequences. However, an understanding of the stakes is not enough to protect the company from data breaches; your employees need the right tools and information presented in a digestible, actionable way.  Conveying facts and instructions via a long PowerPoint presentation simply isn’t effective. In order to get all of your ...
Read More
Topics: Staff Training, Security Threats, Network Security

4 Reasons Your Business Should Outsource a Cyber Security Assessment

Frank
Businesses today face a complex, ongoing battle when it comes to cyber security.  From everyday attacks like generic phishing emails to more advanced cyber crime that intends to cripple businesses via exploitation of data and financial systems, cyber attacks pose serious risks to all organizations, no matter the size or industry. That’s why it’s imperative that businesses have a solid cyber security strategy in place to protect their systems from potentially devastating cyber crime. 
Read More
Topics: Security Threats, Network Security

7 Tax Season Cyber Threats and How You Can Stay Safe

Kaitlin Schneider
Tax season 2020 is well underway, and that means cyber scammers are out in full force, making more and more attempts to access personal information and accounts. Cyber threats are intense year-round, but the threats ramp up in the February-April time period. Nobody wants to add another item to their list of things to get done during tax season, but now, more than ever, is the time to stay safe and secure. To make sure that you’re aware of the many virtual dangers that surface regularly during ...
Read More
Topics: Security Threats, Trends, Finance

Juice Jacking: The Latest Tactic in a Hacker's Cyber Theft Arsenal

Kaitlin Schneider
Picture this: you’re at the airport, having just passed through a long-winding security line. You’re about to take your seat when you check the time on your phone, but then you notice that your battery has 3% remaining. Panic grips you immediately; you still have a 45-minute wait before you can board the plane. And your boarding pass is only accessible through your phone! You think, “Wait a second; I saw a USB charging station a few minutes ago.” You breathe a sigh of relief as you realize that ...
Read More
Topics: Security Threats, Trends

Still Using the Same Antivirus You were 5 Years Ago?

Bill Weber
As technology advances, so too do cyber threats. Without proper antivirus (AV) software that can adequately prevent those ever-changing dangers, your device is at risk of being infected with viruses, worms or malware, and, traditionally, that malware has been file-based. Previous generations of AV would have sufficed against that particular threat. However, the name of the game is money—hackers no longer only use file-based malware, as their potential return on those attacks is significantly ...
Read More
Topics: Security Threats, Network Security

Spotting Spoofed or Phishing Emails on a Mobile Device

Joel Havenridge
You've probably noticed our previous updates covering phishing and how to identify phony emails. And, you've likely had a bit of practice with identifying them yourself on your work computer. But what about staying safe on your mobile device?  The rules for detecting spam and phishing hazards on your phone or tablet differ slightly than what you are used to doing in Outlook on your desktop or laptop. The process isn’t quite as straightforward, but you can still take precautionary steps to avoid ...
Read More
Topics: Security Threats

Protecting Your Business Using Managed IT Security Services

Chris Vilim
Nearly 70 percent of small businesses have experienced some form of cyber attack, and nearly 60 percent have experienced a data breach in the last year. While these statistics are certainly alarming, what’s more alarming is that about half of small businesses have little to no understanding of how to protect their companies against cyber security threats.  That’s where managed IT security services come in. A robust and effective IT security strategy requires numerous tools, and most small to ...
Read More
Topics: Security Threats, Network Security

Is That Email Really From UPS? Or is it a Phishing Email?

Alyssa Sisco
‘Tis the season for online shopping. As the volume of online sales increases, so do the frequency of phishing emails disguised as popular online retailers and delivery services. It’s important to remember that a cyber criminal’s goal is to get you to click before you consider the possibility that the email you’ve received could be fraudulent. This is why it’s important to take the time to really look at emails before clicking any links or downloading attachments — especially if an email is ...
Read More
Topics: Staff Training, Security Threats