SDN Blog

Phishing & ID Theft

Cyber criminals have stolen 143 million credit records in the recent hacking scandal at big-three credit bureau Equifax. At this point you have to assume that the bad guys have highly personal information that they can use to trick you. Read More»

Terry Nelson, Woodstock Communications

Today, Woodstock Communications provides about 1,200 access lines for telephone and internet services. Cable TV is available in some areas, but the company is exploring options to provide state-of-the-art, digital TV services in the future. Read More»

South Dakota Technology Showcase

There’s a cautionary side to the expanding, positive uses of technology that should remain in public awareness, too, of course. Among the risks are an increasing array of weapons and hacking strategies that endanger computer networks. Read More»

AcenTek's Todd Roesler & Ethan Webinger

AcenTek is a fitting name for a company that takes pride in the modern communications products and services that it offers customers. “That’s really something we’ve been pushing as we move forward. We’re really a technology company. Yes, we provide telecommunications, but we’re a technology company.” Read More»

Department of Homeland Security Webinar

The U.S. Department of Homeland Security will host a free webinar on Sept. 14. The presentation is designed help companies make use of federal guidelines to improve protection of computer networks. Read More»

3 Steps to protect your Internet of Things devices

Securing your Internet Of Things Devices

Along with the proliferation of IoT devices comes new scams. Gartner warns that by 2020, there will be a billion-dollar black market selling fake sensors and video data to enable criminal activity. Read More»

Cybersecurity Certifications Fortinet, NSE Training

SDN’s staff strives to resolve any security issues that arise with business clients as quickly as possible. In fact, 13 employees have earned various levels of Fortinet certification, and most of them are working to achieve a higher level. Read More»

Passwords Complexity Security

Bill Burr has been widely described as being the father of the modern-day password. Lately, he’s also become a prominent second-guesser. Now, he says, long phrases that people can actually remember might be a better option. Read More»

cyber threat landscape report

“The challenge facing cybersecurity leaders and professionals certainly isn’t lessening. Cybersecurity experts must be vigilant, aware and thorough in their use of layered security.” - 2017 Q2 Cyber Threat Landscape Report Read More»

Gaming & DDoS Attacks

DDoS attacks are incidents in which in which perpetrators unleash large volumes of malicious traffic to disrupt and maybe temporarily disable a targeted computer network or program. Ninety-five percent of service providers who responded to an annual survey experienced attacks last year, according to Arbor Networks’ Worldwide Infrastructure Security Report for 2016. Read More»