banner-section
CALL US 402.398.9580

Quick Tip: How to enable LastPass autofill on your phone (iOS & Android)

Alyssa Sisco

Once you start using LastPass, you don't want to stop using it. Yes, it's that helpful! The autofill feature makes it incredibly easy to log in to any account, while keeping your usernames and passwords secure. But did you know you can also use it on your phone? LastPass features allow you to not only log in to online accounts, but also log in to smartphone applications. Follow these steps to enable autofill on your Android and iOS devices.

Read More
Topics: Staff Training

How to identify Social Engineering

Alyssa Sisco

Social engineering involves the manipulation or deception of people in order to obtain information or access they shouldn't have. Social engineers could be after a password, bank account information, access to your corporation's network or anything else that could benefit them. Their end goal could be to steal money, company secrets, to disrupt your business or to shut it down entirely.

Because social engineering preys on human behavior, it's one of the most dangerous threats to cybersecurity. Can you rely on each staff member at your company to successfully identify and protect against these attacks?

Read More
Topics: Network Security, Staff Training, Security Threats

Receive a free USB device? It may contain malware.

Alyssa Sisco

When an editor for The Economist (Leo Mirani), received a free mini USB-powered fan at the Singapore summit (where President Trump and North Korean leader Kim Jong-un met) he chose to not plug it in. He didn't know who made this fan, where exactly it came from, or if it had anything on it. However, he did know that any USB device presents the possibility of malware. Whether it's a fan, thumb-drive, mouse, keyboard (or anything else that plugs into your phone or laptop) it could pose a threat to your security. And when all the journalists at a high-stakes meeting - between two countries who have been known to partake in cyber-warfare - are given USB devices, it's best to err on the side of caution. 

Read More
Topics: Security Threats, Staff Training

Are you an easy target for phishing scams?

Alyssa Sisco

The sole objective of any phishing email is to trick you into clicking it. If you aren't vigilant, it can be easy to fall for. It doesn't matter who you are, how much money you have, or what company you work for, you can be targeted and it's important to know how to protect yourself.

Since Amazon and Uber are so well-known and widely-used, cybercriminals have often chosen them to impersonate. Their aim? To lull you into a false sense of security at seeing the familiar brand name. With the addition of a subject line that will illicit a response, anyone could find themselves clicking on a link before even taking a second to think.

Read More
Topics: Network Security, Staff Training, Security Threats

How many cybercriminals does it take to steal an identity?

Alyssa Sisco
Erase the stereotypical image of a lone, hooded man sitting in a dark room, stealing information to exploit for money. Cybercrime has become a well-oiled machine comprised of networks of organized tiers. In essence, an unethical service-based corporation, everyone has a specific job that contributes to the success of the business. Some cybercriminals are experts in hacking and stealing information, while others are good at turning that data into profit. Unfortunately for us, they have all found their way to each other and have learned that working together can be more profitable than lone-wolfing it.
Read More
Topics: Staff Training

Is your inbox a crime scene?

Alyssa Sisco

Much like the shiny lures fishermen use to attract their prey, cybercriminals use email attachments or links to try to get you to click through to malicious content. Often using cheap scare tactics, phishing scams will try to induce a quick, panicked response by making you feel like you have something to lose by not clicking on the link. The instant you click, you open yourself up to malware attacks that can cost you financially, technologically, reputationally, and it will definitely eat up time to reverse the damage that was enacted on your device (if you are able to reverse it at all).

Read More
Topics: Security Threats, Staff Training

What's the difference between a virus and malware?

Alyssa Sisco

You may recall a plethora of headlines and news stories hyping the severity of computer viruses in the late 80's and early 90's. At this point, viruses seem more like an accepted risk you agree to when you own a computer, than the fuel for a big, scandalous headline. Most basic computer users understand that they need some form of Antivirus and to stay away from dicey websites. But with criminal programmers and hackers coming up with new, more aggressive code all the time, is that true today?

When diving into the world of computer safety, a bunch of technical terms start getting thrown around. To most, the term virus has become more of an overarching idea that it is the cause for any malfunction or breakdown your computer incurs, despite its actual definition.

Read More
Topics: Staff Training, Network Security

Quick tip: How to set your favorite search engine as your default

Alyssa Sisco
When you open up your web browser with the intent to search for something, it can be irritating to have  your computer open a search engine you don't like or are not familiar with. Those who regularly search for information on the web usually have a preferred search engine. Below you will find some steps to take when your web browser default is not what you want it to be.
Read More
Topics: Staff Training

Why ransomware education is important for your business

Emily Moulder

From ransomware and malware to email and financial data hacks, business data and personal information are the main targets of most cyber criminals. One of the greatest threats to your information security comes from your employees lack of knowledge on the subject, and hackers know that. They send malicious emails to your employees hoping they won't know the difference between a fake and real email. Educating your entire staff on cyber attacks and what they look like could be the difference in safe online use and paying millions of dollars ransom.

Read More
Topics: Staff Training

6 reasons to train your staff on security basics

Chris Vilim
Owner to owner, I have some advice for you…stepping up training on security basics is one of the most important training sessions you can send your staff to this year. And here are the six strong reasons why…
 
1. Speed up recovery time and save money

You are not only avoiding security threats by training your employees on the importance of security, you’re also providing them with the knowledge of what to do if their system becomes compromised. For example, if an employee makes the mistake of clicking on an email containing malware, the chances of them realizing their error quickly and contacting IT support staff greatly increases. By taking this step right away, the amount of damage done is generally less compared to what it might have been had they waited to call.
 
Read More
Topics: Staff Training, Security Threats