SDN Blog

Page 1 of 15 Pages
2019 BBB Cybersecurity Event Q&A Panel

Shutting down your computer system isn’t a realistic solution to protecting businesses against fraudulent emails. Instead, businesses must find other ways to keep email scams from deceiving employees. Read More»

logging into a computer using Multi-factor-authentication

Hackers have been painfully successful in breaking into electronic files, and they’re getting more sophisticated all the time. That makes MFA needed more than ever. Read More»

Early in 2019, the National Association of Insurance Commissioners, or NAIC, identified cybersecurity as “perhaps one of the most important topics for the insurance sector today.” Read More»

Implementing a good cybersecurity defense is an absolute necessity in today’s risky business environment. Read More»

IoT devices are attractive targets for cybercriminals because they’re plentiful and can be vulnerable. The appeal for hackers is similar to the attraction for users: IoT devices provide relatively easy access to systems. Read More»

SDN Board of Members 2006

Three decades of expanding services and market area have altered SDN Communications in a number of fundamental and obvious ways. One interesting, secondary change has been in how competitors perceive the successful company. Read More»

The First National Bank in Sioux Falls

In early 2013, an underground transformer fire temporarily knocked out electrical power to a four-block area of downtown Sioux Falls. The fire burned beneath the sight line of dozens of businesses, but it left a strong impression on executives at The First National Bank in Sioux Falls. Read More»

Advances in communications technology have helped businesses, organizations and consumers operate faster and more efficiently. But new products and services also create fresh targets for criminals. People who use technology always need to be cautious. Read More»

In just a few decades, the internet has completely transformed the way America conducts business. Using the internet has become so routine that it’s difficult to find a company that isn’t online in some way. Read More»

encrypted password on computer screen

Data breaches that leak other people’s information have become painfully common. No individual or organization is immune from the potential impact. Not even people who work for companies that specialize in cybersecurity. Read More»

Page 1 of 15 Pages