SDN Blog

Golden West - 100 Years in telecommunications

Golden West has been a significant factor in the telecommunications business in South Dakota for a 100 eventful years, and the Wall-based company keeps preparing for the future. Read More»

Avoiding Hackers, Data Breach Essentials

If you’re in business, hackers have probably breached your organization’s computer network at some level. Company leaders might not be aware of the intrusion yet, but they will discover it eventually. Read More»

Email Scam Warning from the FBI

The FBI tracks scams in a category called Business Email Compromise. In the 18 months immediately after January 2015 BEC scams cost more than 21,100 domestic and international victims approximately $3.1 billion. Read More»

Keys for Encryption

Encryption is the process of converting data into computer coding that cannot be easily deciphered by unauthorized users. However, users with the password or online key can convert the mathematical algorithm back to readable data. Read More»

Libraries & E-Rate funds

Overall, K-12 schools in South Dakota appear to be taking good advantage of subsidies available through the E-Rate Program, but public libraries seem to under-use the assistance. That might be a reflection of program awareness. Read More»

Infographic Of The Month: Phishing Emails

Infographic of the Month

Don't get hooked! Be on the lookout for the tell-tale signs of a phishing email, before you click! Following these basic steps can help protect your company and customers. Read More»

2016 Consumer Privacy Index Report

A whopping 92 percent of U.S. Internet users worry about online privacy, and 89 percent say they avoid companies that don’t protect their privacy. Read More»

Better Business Bureau 2016 Cybersecurity Event

The low-cost and successful nature of scamming operations virtually guarantees their continued existence. So, companies and consumers must be on guard. In fact, increases in cybercrime suggest that prospective victims should be on higher alert than ever before. Read More»

Cybersecurity - What to do if...

Like technologies, online threats change. Cyber thieves constantly refine their tactics and tools to create new threats. A business network that is safe and secure today might be at risk tomorrow. Businesses have to regularly update their security plans and procedures to keep up. Read More»

Health Care Cybersecurity

I’ve been on heightened awareness for identity theft for the past 18 months. I was among millions of past and present customers of the health insurance giant Anthem Inc. who were notified in the spring of 2015 that cyber attackers had successfully hacked the company’s electronic records. Read More»