SDN Blog

software & application security

When the subject is cybersecurity, business people are likely to think about phishing or DDoS Attacks. But there are deeper, even more pervasive security concerns that business people who use software applications should also keep in mind. Read More»

Certfied Gig-Capable Providers NTCA

NTCA - The Rural Broadband Association certified Midstate Communications' network, proving it’s a Gig-Capable Provider. And the company is proud to offer such a high-level of service to all of its customers. Read More»

Infographic: Elevate Your Network

Cyber Defense For The Win

With the NCAA basketball season championship tournaments going, we thought it would be a fitting time to apply what we know about basketball to what our experts say about the best practices in cybersecurity. Read More»

Cyber questions board members should ask

To be able to avoid serious damages, companies must thoroughly and constantly monitor threats, and then adjust their protective strategies accordingly. That usually means that cybersecurity has to be a priority from board members and owners on down to the company’s team. Read More»

DakotaCon 8

People interested in cybersecurity will have an opportunity March 23 in Madison, S.D. to hear experts talk about several intriguing topics, and admission will be free. Read More»

FBI - Federal Bureau of Investigation

Sioux Falls area businesses have a rare opportunity to hear one of the nation’s top G-Men March 27. Supervisory Special Agent Jay Patel will open the US Chamber of Commerce event with an unclassified FBI briefing Read More»

SDN employees step up to help elementary school

Garfield Elementary BINGO Donations

Several elementary schools in Sioux Falls don’t enjoy the benefit of having active parent-teacher groups. The schools’ students miss out on the volunteer help and the financial assistance that parent organizations typically provide. Read More»

Sioux Falls Chamber Cybersecurity Conference

There’s a 16-minute video available on YouTube that’s more compelling than most TV dramas. The real-life video shows a team of hired hackers breaking into a power cooperative’s facilities somewhere in the Midwest to test and help improve the company’s security’s practices. Read More»

Cybersecurity plans & business executives

The risks and potential consequences of cybercrime demand that cybersecurity be a priority for top business executives and corporate board members. Read More»

Look for unusual network activity to help detect breaches

Data Breach, What to look for

On average, organizations take 191 days to detect a breach and 66 days to contain the intrusion, according to a study by the Ponemon Institute. Read More»