Blog & Tools

Popular Resources

Topic: Cybersecurity

  1. Social surveys, trendy posts can be social engineering risks
    While it's fun to see people showcase the fashion and haircut choices of their senior year days, it's also a reminder of the information hackers can gain by sharing something that is seemingly fun.
  2. DSU making headway in getting women into cybersecurity
    Dakota State University is making slow but noteworthy headway in its quest to get more women in college to study cybersecurity and other computer fields. It's a significant but worthwhile challenge.
  3. What’s the hurry? Slow down and be wary of suspicious email
    Shutting down your computer system isn’t a realistic solution to protecting businesses against fraudulent emails. Instead, businesses must find other ways to keep email scams from deceiving employees.
  4. Email fraud is the focus of free business seminar in Sioux Falls
    Email scammers have bilked U.S. businesses and organizations out of more than $3 billion since 2016, according to the Better Business Bureau Inc., and the cyber thieves tried to get $23 billion more.
  5. Board guides successful, 30-year evolution of SDN
    Three decades of expanding services and market area have altered SDN Communications in a number of fundamental and obvious ways. One interesting, secondary change has been in how competitors perceive the successful company.
  6. Bank goes extra miles to improve customer data protection
    In early 2013, an underground transformer fire temporarily knocked out electrical power to a four-block area of downtown Sioux Falls. The fire burned beneath the sight line of dozens of businesses, but it left a strong impression on executives at The First National Bank in Sioux Falls.
  7. Cyber threats are real and stakes are high
    Good preparation for bad weather won’t change the forecast, cybersecurity expert Bryce Austin writes. In contrast, good cybersecurity planning can significantly impact outcomes.
  8. Cybersecurity experts provide valuable context to threats
    Businesses that want to enhance protection of their electronic assets should complicate network pathways that hackers might follow, not just try to block them from entering, according to a national cybersecurity expert.
  9. 3 Best password tactics to trump would-be hackers
    The name “donald” cracked SplashData’s list of the Top 100 Worst Passwords in 2018, debuting at No. 23 in the company’s eighth annual ranking of bad passwords.
  10. Free cybersecurity resources, advice now available for small businesses
    The FTC offers free advice online to help small businesses fight threats such as phishing schemes, ransomware attacks and tech support scams. Materials include fact sheets, videos and quizzes.
  11. Watch a hacker at work during Cybersecurity Conference live demonstration
    “Cybersecurity is a concern not only for IT professionals, but also for business owners, executives, HR professionals and others.”
  12. Certified firewall ‘wizards’ help SDN protect customer networks
    Businesses that subscribe to SDN Communications’ Managed Firewall Service enjoy advantages. For one, customers may contact the company no matter what type of cybersecurity challenge confronts them.
  13. Burden of protecting information is heavy and growing
    A new report by the Center for Strategic and International Studies and the security software company McAfee estimates that cybercrime costs the world nearly $600 billion a year.
  14. It’s time to clean out your computer and tune up your life
    National Clean Out Your Computer Day, which is the second Monday of every February, is a perfect observation for people like me.
  15. Concerns about data privacy moving closer to center stage
    Data Privacy Day probably didn’t create three-day weekends for many Americans, but the Jan. 28 observation brought welcome attention to cyber issues of growing importance in the United States.
  16. Data Privacy: Resources for you, your business
    Advances in high-tech fields such as automation and artificial intelligence, as well as old-fashioned criminal greed, have made digital data difficult to protect. But it must be done.
  17. Cyber insurance: An emerging product that’s finding its place
    To help protect themselves financially, some businesses are buying cyber insurance. It’s a relatively new offering that can help cover expenses related to incident response, legal defense and business interruption.
  18. Protecting cloud-based networks requires expansion of strategy
    Among the benefits of a business expanding its network to the cloud is that cybersecurity can be less of a concern. Right? Wrong.
  19. Yikes! Video documents vulnerability of cyber infrastructure
    I recently watched a captivating, 16-minute video. It documented how a team of hired hackers rather easily broke into the headquarters, substations and other facilities of what appeared to be a secure rural electric cooperative.
  20. BBB cybersecurity event will be time well spent for businesses
    Business vulnerabilities continue to expand. The way the cybercriminals can infiltrate your business continues to change. What are things you can do to protect yourself?