Blog

#FoundersFriday with Ryan Heining: Why Did We Begin?

#FoundersFriday with Ryan Heining: Why Did We Begin? Where did we begin? Why did we begin? Often, entrepreneurs are asked the question, where did you start? Where did you begin your company? Where were you at? What were you doing? I think it’s more relevant to ask, why? Why did you create or build this...
Read More

National Cybersecurity Awareness Month Recap

November Already? We can’t believe October has already come and gone…which means National Cybersecurity Awareness Month has as well.  We had so much fun providing the tips & tools to help create a culture of cybersecurity within your organization.  Although NCSAM is over, we wanted to leave you with a final recap so that you...
Read More

NCSAM: #FoundersFriday with Erik Tammearu

#FoundersFriday with Erik Tammearu.   Welcome to the Revolution… The only guarantee we have is that there will be change…it’s how we handle the change! —BOBism When I started my career in the rubber and plastics industry back in the early to mid-1990s, I was fortunate to walk the assembly lines of some of the...
Read More

NCSAM: Industrial Revolution 4.0. Where Is It and Where Is It Going?

Industrial Revolution 4.0. Where Is It and Where Is It Going?  The Industrial Revolution—4.0. A Move Towards Digitization. The Industrial Revolution 4.0, also known as Industry 4.0, uses IoT and systems to collect large amounts of data that can be used by manufacturers to analyze and improve their work.  This allows companies to use these...
Read More

NCSAM: What is 5G? It’s Impact On the Average Consumer & Cybersecurity.

What is 5G? It’s Impact On the Average Consumer & Cybersecurity. What is 5G? There is a lot of talk about what 5G might become…but not a lot of understanding about what it actually is. 5G = 5th generation wireless technology. Each generation is increasingly reliable, faster, etc.  1983—1G: Analogue, only carried voice signal.  1991—2G:...
Read More

NCSAM: #FoundersFriday with Jeff Starbird

#FoundersFriday with Jeff Starbird. Small Business Alert. This past June, The Wall Street Journal published a Cybersecurity report summarizing findings from a survey of information security officers at nearly 400 companies. The size of the companies varied, but the findings were especially alarming for small businesses. Small businesses don’t have the resources that larger companies...
Read More

NCSAM: How COVID-19 Has Affected Small Business Cyber Safety & What to Do About It.

How COVID-19 Has Affected Small Business Cyber Safety & What to Do About It. COVID-19 has created a digital dependency amongst businesses, which has also led to increased vulnerability to cyberattacks. The United Nations Security Council released information that cybercrime is up 600% since the pandemic began.  Izumi Nakamitsu, U.N. disarmament chief, said the threat...
Read More

NCSAM: Why It’s Time for SMB’s to Prioritize Cybersecurity.

Why It’s Time for SMB’s to Prioritize Cybersecurity. Small and medium-sized businesses are vital to our nation’s economy, but threats to these SMB’s are only continuing to grow.  Sixty-two percent of SMB owners expressed they are very concerned that their business could be vulnerable to a cyberattack, according to a U.S. Senate Committee on Small...
Read More

NCSAM: #FoundersFriday with Ryan Heining

#FoundersFriday with Ryan Heining. The New Workplace. The workplace and workforce has been dramatically altered as a result of the COVID-19 pandemic. Telework, home offices, and the technologies that allow these environments to operate have been around for years. However, the pandemic has rapidly pushed these environments and technologies into the forefront. Companies like Zoom...
Read More

NCSAM: Creating An Inclusive, Empowering Cybersecurity Culture At Work.

NCSAM: Securing Devices at Home and Work—Creating An Inclusive, Empowering Cyber Security Culture At Work. A culture of cybersecurity is a pattern of behaviors, beliefs, assumptions, attitudes, and a willingness to do things that promote security. Cultural change is needed to implement and cultivate a newly developed security culture within your organization. Here are three...
Read More

NCSAM: Equipping Your Employees to Securely Work from Home.

NCSAM: Securing Devices at Home and Work—Equipping Your Employees to Securely Work from Home. Did you know that seventy-four percent of companies plan to permanently shift to more remote work post-COVID? (Gartner). However, ninety percent of IT professionals believe remote workers are not secure and seventy percent think remote staff poses a greater risk than...
Read More

NCSAM: #FoundersFriday with Erik Tammearu

#FoundersFriday with Erik Tammearu. Connect to Correct… Things, an interesting way to describe what seems to be our new way of life. IoT, internet of things. As we move through our day, you’d be hard-pressed not to leverage the convenience’s these ’things’ bring to our lives. If everything is connected correctly and secured within your...
Read More

NCSAM: Smart Devices Need Smart Security.

NCSAM: If You Connect It, Protect It—Smart Devices Need Smart Security. Here are three steps you can take to ensure if you’re connecting it, you’re protecting it. 1. Lock Down Your Login. Make sure that your passwords are long (at least 12 characters), unique and safely stored. Passwords are not enough. Use multi-factor authentication— biometrics,...
Read More

NCSAM: IoT Security.

NCSAM: If You Connect It, Protect It— IoT Security. What is IoT? IoT (Internet of Things) are devices that have network connectivity, collect user data, process and analyze that data, and then return it back to the user (a giant network of connected devices). Example: your smartphone, smartwatch, smart home appliances, printer, washer & dryer,...
Read More

#FoundersFriday with Jeff Starbird

#FoundersFriday with Jeff Starbird. This week I received a letter from Allina Health informing me the company was a victim of a national ransomware attack. Allina was fortunate as their software provider along with forensic experts and law enforcement were able to prevent the cyber criminal from blocking their system access and fully encrypting files....
Read More

Change In Seasons… and Business

Similar to the official/unofficial transition from Spring into Summer over the Memorial Day weekend, we are met with the same meteorological season change around the Labor Day weekend. Living in Minnesota, we are blessed with 4 solid seasons! It’s interesting how the anticipation of a change in weather, ecology, and the amount of daylight has...
Read More

Trust Your Gut

My gut tells me… When it comes to making decisions, we all look for supporting information, statistics, advice and experience to help us make the correct decision. This applies to our personal and professional lives. I rely on this foundation of ‘my gut tells me’ in most situations, whether it’s related to myself, my family,...
Read More

10 Cyber Security Terms You Need to Know

Cyber Security is full of jargon (terms used within a particular industry or group which are difficult for others to understand) and can be intimidating.  However, these terms are very important to be aware of and understand. We’re here to help break down the most important terms you need to know. 10 Cyber Security Terms...
Read More

Are We Losing Control? + How to Regain It.

A few thoughts from founding partner, Erik Tammearu, in a recent morning meeting: “It occurred to me the other day, the first thing I reach for in the morning is my phone…(not my toothbrush). Then I looked around to see my smart tv, Sonos speaker, Eero, Kindle, Garmin watch…etc.  Back to my phone. Staring at...
Read More

Why I Read My Inboxes Differently Now

It’s 8 a.m. I sit down at my desk, open my email, scroll through my inbox and respond to any important action items. It’s part of my morning routine. I bet yours looks similar as well. However, as I go through my inbox on this particular day, I’m reading it differently. I’m actively searching (versus...
Read More