(402) 261-0123


Learn more news

Archives for Category: Featured

Families Are Targets, Too: 5 Home Cybersecurity Tips

It's not just big businesses that are at risk of being hacked or cyber-attacked.

It may seem scary to let your kids–or yourself–go online after you hear that, but don't throw all the computers away and live off-the-grid just yet. Try implementing these five cybersecurity practices in your home to give your family some peace-of-mind online:

1. Create strong passwords


5 Easy Ways to Improve Your Cybersecurity at Work

It’s true, some of the smallest improvements can really be game changers — especially in cybersecurity. They say the end-user is the weakest link—that’s you! Whether you know it or not, cyber criminals see you as an easy target. But don’t worry, you don’t need the newest security technology to protect yourself from some of the most common threats.

Related Articles

Anatomy of an MSP: Breaking & Entering

We all know that security is hard… for an MSP, it’s even more difficult. In addition to balancing the everyday security risks that every business faces, MSP’s also have to focus on their customers’ networks. A lot of times, customer networks take precedence and MSP’s in-house security falls short. This is a message to all MSP’s: it’s time to take security off the back burner. ...

10 Mistakes That Will Get You Hacked

Sometimes, it's the little things that make a big difference. This is especially true for cybersecurity. Here are 10 common mistakes made in office settings that leave people vulnerable to cyber attacks, presented by Security Engineer, Will Tipton:  

Related Articles

<div class="et_pb_blog_grid_wrapper"><div id="related_posts" class="et_pb_blog_gr...

Vulnerability Management: Don’t Be That Guy

Ignore security at your own and your customers’ peril. Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet… and didn’t stay up to date on vulnerabilities and patching. His lack of situational awareness led to what he initially viewed as a brief operational interruption, but has now come to und...

Scam Alert: Sextortion Email Using Real Passwords

In the past 48 hours, security operators have seen a new ‘sextortion’ message begin popping up in client inboxes almost everywhere. The most frightening part of this message is that it lists a password either in the subject line or the first sentence. This password probably looks familiar, and if you’re one of the (too many!!!) people who reuse the same password for multiple sites (or everyt...

A Simple Guide to Online Privacy and Protecting Your Identity

It is easier than ever for cyber criminals to obtain your private information, especially when "trustworthy" sites are the ones putting it on the line. Follow these simple steps to ensure you're doing what you can to keep your information safe at work and at home:

Check for credibility

When you're shopping online or creating an account on a website, ask yourself the follow...

Don’t Get Hooked! 7 Signs of a Phishing Email

it, but your computer, mobile devices, accounts, and information all have value to cyber criminals. According to Verizon's 2017 Data Breach Report, 91% of company breaches start with an email. Knowing how to maintain email security at the user-level will keep you and your company safe. Here are the top 7 signs of a phishing email to watch out for:

Healthcare Case Study -Malware on Surgical Laser

ase studies that give you goosebumps thinking about the current state of cybersecurity in the healthcare industry. For example, a medical laser being infected by malware. Read on for the details.

The Organization 

A regional health system with more than 13,000 employees

The Environment

CEO, Justin Kallhoff’s Interview with Bar Napkin Business

11 Years Ago, Justin Kallhoff, our CEO saw a significant gap in the cybersecurity of businesses. Large businesses have sufficient funds for the cybersecurity needed. Small to medium businesses however, are left with little to no protection. To make matters worse, criminals out to steal data from such companies figured this out rather quickly. Big companies may have deeper p...

Cylance Case Study – Healthcare

The Customer 

A US-based healthcare services and product provider with over 400 locations nationwide, directly supporting over one million patients.

U.S. Warns about Phishing Attacks on Utility Companies

U.S. warns about phishing attacks on nuclear, energy, aviation, water, and manufacturing industries 

The U.S government issued a rare public warning that sophisticated hackers are targeting energy and industrial firms, the latest sign that cyber attacks present an increasing threat to the power industry and other public infras...

11 Years of Work and Play at Infogressive

11 Years Ago - DVDs were being sold in Japan, the internet exceeded 10 million users for the first time, Ebay became a reality and our CEO began a mission to make the internet a safer place.

2006 - Infogressive, Inc. was founded in Lincoln, NE 

Whiteboard Wednesdays: Major Equifax Breach and What You Can Do

The recent breach reported by Equifax is massive, with more information surfacing all the time. When something like this happens, we hear a lot of questions from concerned individuals, such as: Could this happen to our business or organization? Could this have been prevented? How do I protect myself in case my information was stolen? What exactly happened? Derrick Masters, Security Enginee...

Scam Alert

Scam Alert - Bad guys are exploiting the Hurricane Harvey disaster. You may see messages on social media or, you may even receive an email asking you to donate to #HurricaneHarvey. Scammers are sending fake links, designed to take your money and prevent it from getting to those who really need it.

Follow these tips to stay safe:

  • Ty...

Client Spotlight: Adam Walter

There is nothing more important to us at Infogressive than our customers. Through roles in both the public and private sector, Adam Walter has retained our team to work with him on a wide variety of cybersecutiy needs. As he says in the video, sometimes you are just too close to a problem. It can take outside eyes to come in and uncover some issues that you didn’t know you h...