SDN Blog

Page 1 of 73 Pages
Cybersecurity - What to do if...

Like technologies, online threats change. Cyber thieves constantly refine their tactics and tools to create new threats. A business network that is safe and secure today might be at risk tomorrow. Businesses have to regularly update their security plans and procedures to keep up. Read More»

Health Care Cybersecurity

I’ve been on heightened awareness for identity theft for the past 18 months. I was among millions of past and present customers of the health insurance giant Anthem Inc. who were notified in the spring of 2015 that cyber attackers had successfully hacked the company’s electronic records. Read More»

Passwords: A recipe for security, words to avoid

The worst passwords to use

Simplistic, numerical sequences are commonly used for passwords. Six of the 10 most common passwords in 2015 were nothing but numerical sequences. In addition, the top-row, keyboard sequence “qwerty” came in at No. 4. Read More»

RedTeam Hacks Electric Cooperative

I recently watched a captivating, 16-minute video. It documented how a team of hired hackers rather easily broke into the headquarters, substations and other facilities of what appeared to be a secure rural electric cooperative. Read More»

BBB of SD Cybersecurity Event

Cyberattacks on small businesses are increasingly frequent and larger in impact. Criminals from countries around the world are constantly looking for electronic information of value or trying to disrupt commerce. Read More»

Computer Code

The three toughest days in Thane Barnier’s professional life came in 2013, when he had to fight a nasty variety of ransomware. Read More»

County Commission Data Center Tour

The 25,000-square-foot, bunker-like Data Center just northwest of Sioux Falls provides secure space for servers and other equipment so that SDN and some of its clients can back up their valuable electronic information. Read More»

Elev8 Leadership Training Rock Climbing

Companies that provide leadership training can benefit from increased employee loyalty and reduced turnover. Providing training can also help companies identify possible problem areas developing within the organization. Read More»

7 ways to ruin an Internet scammer's day

Warning about phishing schemes

Recently, while navigating the internet, an SDN customer received what appeared to be a security window pop-up that encouraged the customer to call an 800 number because his system might have been compromised. Read More»

Layered Cybersecurity

Cyberattacks can come from across town or around the world. Victims can’t always pinpoint who’s to blame. Regardless of where the attacks are coming from, businesses have to defend themselves and do it well. Their best option is to take a layered approach to cybersecurity. Read More»

Page 1 of 73 Pages