Skip to main content

Resources

Security Patch Overload

Tuesday, November 5, 2019

Security Patch Overload

The endless cycle of patching may leave many asking themselves, Why? Is there a better way? How can we improve this process? A modern patch management program should address the following topics,

Read More...

Categories: Blog

Safe Social Media Usage

Thursday, October 24, 2019

Safe Social Media Usage

We, as a society, use the internet, and especially social media, more with each day. We share everything, including travel itineraries, political views, and, sometimes, even what we had for lunch. However, we don’t often think about the consequences of the things we post on the internet. There are t...

Read More...

Categories: Blog

{Threat Advisory} SIM Swapping

Wednesday, October 16, 2019

{Threat Advisory} SIM Swapping

The FBI recently released a security advisory warning organizations about the rising threat of attacks that bypass multi-factor authentication. "The FBI has observed cyber actors circumventing multi-factor authentication through common social engineering and technical attacks," the FBI wrote in a Pr...

Read More...

Categories: Blog

Chad Knutson is a Guest Panelist on SD Focus

Tuesday, October 15, 2019

Chad Knutson is a Guest Panelist on SD Focus

October is Cyber Security awareness month. Our guests bring everyone up to speed on being cyber smart. Guests include: Trevor Jones, DSU; Brent Gromer DCI Internet Crimes against Children; Jessie Schmidt, SD Better Business Bureau; Chad Knutson SBS Cybersecurity.

Read More...

Categories: Blog, Videos

What Does the Average Financial Institution Spend on Cybersecurity?

Tuesday, October 15, 2019

What Does the Average Financial Institution Spend on Cybersecurity?

CISOs have found themselves at a disadvantage when directors or executive peers challenge the cost of their cybersecurity spend, since little-to-no peer information is available. Let's take a look at a recent study and industry peer information to evaluate what the average financial institution spe...

Read More...

Categories: Blog

Is Your BYOD Policy Designed to Fail?

Monday, October 7, 2019

Is Your BYOD Policy Designed to Fail?

Managing information security for a mobile workforce takes a strategic effort prior to allowing employees access to company information via personally owned devices. Make sure your BYOD policy contains these critical components.

Read More...

Categories: Blog

{Webinar} Own, Secure, and Protect Your ISP

Wednesday, October 2, 2019

The theme for this year's National Cybersecurity Awareness Month is Own IT.  Secure IT. Protect IT.  Join SBS as we discuss how a comprehensive and repeatable Information Security Program (ISP) is a map of exactly how your organization owns, secures, and protects your confidential customer informati...

Read More...

Categories: Webinars, Webinar
Page 5 of 23First   Previous   1  2  3  4  [5]  6  7  8  9  10  Next   Last