script Blog | NebraskaLand Bank
skip to main content

NLB Blog

NebraskaLand Bank's Craft Table

NebraskaLand Bank's Craft Table

Enjoy a holiday craft this Fall season. This simple felt owl pattern is a fun activity for every member of the family. If you would like to avoid sewing and stitching, you can omit the cotton craft stuffing step and use fabric glue instead!

continue reading "NebraskaLand Bank's Craft Table"

A Field Guide to Ransomware

A Field Guide to Ransomware

While there are myriad online threats to businesses, organizations and governments, ransomware is by many metrics the worst right now. Other kinds of attack can have personal fallout, but for destructive impact on its targets ransomware is dominant, and for that reason one of the most lucrative for the attackers that deploy it.

continue reading "A Field Guide to Ransomware"

How Hackers Use Spoofing to Deceive Their Targets

How Hackers Use Spoofing to Deceive Their Targets

Spoofing is a method commonly used by hackers across a wide range of cyberattacks including but not limited to phishing, social engineering, ransomware, and business email compromises. While the techniques and technology can vary, spoofing allows a hacker to alter their identity to appear to be a trusted source, such as a co-worker, relative, or secured online service.

continue reading "How Hackers Use Spoofing to Deceive Their Targets"

Business Email Compromises (BEC) Cost Companies An Average of $75,000

Business Email Compromises (BEC) Cost Companies An Average of $75,000

Business email compromise (BEC), also known as “CEO fraud,” “W2 fraud,” or email account compromise (EAC) is a more targeted and damaging form of phishing, where the primary attack vector is to either hijack or “spoof” the email account of an executive or other position of power within a company or organization. The end goal is typically to convince an employee of the company to wire money.

continue reading "Business Email Compromises (BEC) Cost Companies An Average of $75,000"

How Social Engineering Can Sink Your Business

How Social Engineering Can Sink Your Business

Social engineering is a comparatively low-tech method of cyber attack where a hacker or scammer will use deception to coerce or otherwise manipulate their target into providing information that can be used in a data-related crime. While there is some overlap between phishing and social engineering, one of the main elements specific to social engineering is that it targets human behavior through personal interaction, rather than more technologically-oriented methods like spoofed phishing pages.

continue reading "How Social Engineering Can Sink Your Business"

Phishing Is One Of The Top Five Threats To Your Business

Phishing Is One Of The Top Five Threats To Your Business

Of all of the major cyber threats to businesses and individuals, phishing is the most common. Recent studies indicate that 65 percent of U.S. organizations experienced a successful phishing attack in 2019, and 22 percent of data breaches began with phishing campaigns. 

“In its simplest form, phishing is the practice of sending a link via email or text or embedding a link on a website that, when clicked, downloads malware onto the user’s device as well as any other devices that are connected to the same network,” says CyberScout founder and chairman Adam Levin.

continue reading "Phishing Is One Of The Top Five Threats To Your Business"

How Ransomware Works and How It Can Impact Your Business

How Ransomware Works and How It Can Impact Your Business

Regardless of the industry or sector, ransomware is the cybersecurity threat that has consistently made the most headlines over the last five years, and with good reason. As a vector of attack, it has brought multinational corporations to a screeching halt, shut down local governments, caused school closures, and has led to at least one death by disrupting medical services.  “While the sophistication and methods of attack may vary, the short answer is that ransomware is a type of malware that encrypts critical data on a computer or computer network so that users can’t regain access without paying a ransom,” says CyberScout founder and chairman Adam Levin

continue reading "How Ransomware Works and How It Can Impact Your Business"

RSS
Local People. Local Decisions. Local Ownership.
top
^