SDN Blog

Email Scam Warning from the FBI

The FBI tracks scams in a category called Business Email Compromise. In the 18 months immediately after January 2015 BEC scams cost more than 21,100 domestic and international victims approximately $3.1 billion. Read More»

Keys for Encryption

Encryption is the process of converting data into computer coding that cannot be easily deciphered by unauthorized users. However, users with the password or online key can convert the mathematical algorithm back to readable data. Read More»

Infographic Of The Month: Phishing Emails

Infographic of the Month

Don't get hooked! Be on the lookout for the tell-tale signs of a phishing email, before you click! Following these basic steps can help protect your company and customers. Read More»

2016 Consumer Privacy Index Report

A whopping 92 percent of U.S. Internet users worry about online privacy, and 89 percent say they avoid companies that don’t protect their privacy. Read More»

Better Business Bureau 2016 Cybersecurity Event

The low-cost and successful nature of scamming operations virtually guarantees their continued existence. So, companies and consumers must be on guard. In fact, increases in cybercrime suggest that prospective victims should be on higher alert than ever before. Read More»

Cybersecurity - What to do if...

Like technologies, online threats change. Cyber thieves constantly refine their tactics and tools to create new threats. A business network that is safe and secure today might be at risk tomorrow. Businesses have to regularly update their security plans and procedures to keep up. Read More»

Health Care Cybersecurity

I’ve been on heightened awareness for identity theft for the past 18 months. I was among millions of past and present customers of the health insurance giant Anthem Inc. who were notified in the spring of 2015 that cyber attackers had successfully hacked the company’s electronic records. Read More»

Passwords: A recipe for security, words to avoid

The worst passwords to use

Simplistic, numerical sequences are commonly used for passwords. Six of the 10 most common passwords in 2015 were nothing but numerical sequences. In addition, the top-row, keyboard sequence “qwerty” came in at No. 4. Read More»

BBB of SD Cybersecurity Event

Cyberattacks on small businesses are increasingly frequent and larger in impact. Criminals from countries around the world are constantly looking for electronic information of value or trying to disrupt commerce. Read More»

Computer Code

The three toughest days in Thane Barnier’s professional life came in 2013, when he had to fight a nasty variety of ransomware. Read More»