Post info:

Personal Information + Phone Number + Trickery = Hacked

Here is an informative article from Forbes on a tactic hackers are using for Ransomware involving phone numbers and personal information. We are under the false assumption that hackers are after your personal computer and the information on that. However, people are using their personal phone just as much as their computers. This article is tailored for phones, but the security measures can be applied to your computer as well. Article: (CLICK HERE)

Read the full post

Post info:

WannaCry – Ransomware

A new strain of ransomware was reported on Friday named WannaCry. The ransomware has spread quickly across the world infecting hundreds of thousand systems. This virus is a bit more malicious though because it just doesn’t infect the PC that it came in on, but the whole network in which it is connected to. This virus is so broad Windows created patches for systems they don’t service anymore including XP & Vista. (If you are a business, we have STRONGLY recommended upgrading those PC’s) 

Read the full post

Post info:

Notice from the FBI concerning email

The nation has seen a rise in business emails being compromised leading to billions of dollars being transferred out of their accounts to bad guys. Just because we are in South Dakota, does not mean we are irrelevant to this type of scam. Below is a public service announcement from the FBI on the compromise of emails, background, stats, and some suggestions for protection for your business. Please take some time to read through and education/protect yourself and employees of

Read the full post

Post info:

Do you use Google Docs?

The bad guys are at it again. This time they are targeting Google Doc requests. They are sending out a Google Doc shared document with you. Once you click it, it brings you to a URL redirect.  The final part of the attack is it asks if Google Docs can read, send manage your emails and manage your contact. They are using all of the images that Google has with the Google Drive accounts as well as gmail icon. Once

Read the full post

Post info:

ATM Skimming Devices

If you ever get money out of an ATM or pay at the pump, you should incorporate checking the card slot or the keypad for a skimmer into your routine. Krebs on Security provides a quick education on skimmers. These types of devices have been as close as Aberdeen. Consider them everywhere. Article: https://krebsonsecurity.com/2017/03/why-i-always-tug-on-the-atm/   

Read the full post

Post info:

CIA Hacks Released. What does it mean for you?

This week, WikiLeaks dumped thousands of files documenting hacking tools used by the C.I.A. One of the examples is how to turn 2013 model Samsung smart TV’s into listening devices. The list of covert listening devices doesn’t end there. Other brands named were Apple’s iPhone, Google’s Android, and Microsoft Windows. Essentially, this dump of CIA’s hacks has given the blueprints to every hacker in world on how to hack those particular models/companies. Wait, don’t I have a Windows computer in

Read the full post

Post info:

IRS SCAM

Scammers are at it again. As usual, they are utilizing tax season and IRS threats to try to give out your personal information. Here is a screen shot of the email. There are multiple mistakes that are in this email. The biggest red flag is the fact that the IRS is emailing you. The IRS will NEVER initiate contact with you via email. Other flags are the atrocious grammar and random capitalization of words. Keep vigilant!!!

Read the full post

Post info:

Send over the W-2’s

It’s TAX TIME!!! With that comes tax fraud. We have seen phishing emails that seem to come from the boss of the company requesting all of the W-2’s be sent to them.  This is a scam. If you do get a request like this and you suspect that is it a fraud, call the individual to see if it is legit. Don’t email. Stay vigilant!

Read the full post

Post info:

Do you use a Netgear Router for work or home use?

An article was released yesterday that Netgear routers have a security flaw that should be addressed. If users have their remote management activated (it is off by default) the router can be accessed and hijacked remotely. Long story short, your router password can be easily retrieved by someone else. There are 31 models affected by this security flaw. To see the models affected, follow this link.

Read the full post

Post info:

Patch Tuesday

  As you may know, Microsoft releases their updates on the second Tuesday on each month. It is very critical for businesses and home users alike to assure the success of these updates. These updates are patches to security flaws within their software (Windows, Adobe, Flash, Google, and Java). Long story short, these are the holes that hackers are using to get into computers and networks. When releasing these patches, they are shutting the doors so hackers can’t access your

Read the full post

Posts navigation