SDN Blog

Cybersecurity Bulletin: Meltdown, Spectre

Meltdown, Spectre Vulnerabilities

Updates and patches are being rolled out quickly to help computer owners and system managers thwart the new year’s first widespread cybersecurity risks: Meltdown and Spectre. Read More»

Protecting networks & backing up data

Not all ransomware attacks are successful, of course. Companies are learning to adequately back up data and to keep their networking equipment and programs up to date. Read More»

Cybersecurity careers

The number and diversity of employment opportunities in cybersecurity and digital management are exploding rapidly. But there aren't enough trained workers to fill the need. Read More»

Infographic of the Month

In this month's infographic, we show you the best practices for keeping your devices up to date and secure with the latest software. Read More»

5 Cyber resources for every small business

Small Business Cybersecurity

A 2016 study sponsored by Keeper Security Inc. and conducted by the Ponemon Institute found that more than 50 percent of small and midsized businesses had been breached in the prior 12 months. Read More»

Medical Data, Healthcare Information & cybersecurity

The national movement from paper files to electronic medical records has greatly improved the efficiency of treating patients. But it's also making all of that personal data more available to hackers around the world. Read More»

Cyber Terms

There are other words and phrases, especially in the cybersecurity realm, that can be confusing. I talked to some cybersecurity experts at SDN Communications, checked several websites and made a list. Read More»

Infographic Of The Month: Email Spoofing

Infographic of the Month

In this month's infographic, we explain who is targeted by spoofing emails, how they trick you and what to look for to avoid falling victim to this type of phishing attack. Read More»

Virtual Reality, Augmented Reality, Mixed Reality

Without the use of virtual reality, some electronic games probably would be just, plain boring. VR technology uses equipment such as headsets to present realistic images in an imaginary environment. Read More»

BBB Cybersecurity Event

No business, institution or individual can avoid malware attacks, not even a university that trains future cybersecurity experts. Read More»