Showing Results 1 - 20 of 132
  • Going on Vacation? Simple Steps to Make it Cypersecure


    The summer season is upon us, and soon millions of people will be traveling all over the world. If you are going on vacation, here are some travel tips to help keep you cyber savvy and safe.

    Download PDF
  • Top Three Ways Cyber Attackers Target You


    Social engineering attacks, in which adversaries trick people into doing something they shouldn’t, are one of the most common methods that cyber attackers use to target people. The concept has been used by con artists and scammers for thousands of years. What is new is that the Internet makes it very easy for a cyber-criminal anywhere in the world to pretend to be anyone they want and target anyone they want. Below are the three most common types of social engineering methods that cyber attacker

    Download PDF
  • Identity Theft: Preventing, Detecting, and Responding


    In today's digital age, your personal information is more valuable than ever. Unfortunately, this also makes it a prime target for identity theft. Understanding this threat, detecting it, and knowing how to protect yourself are essential elements in safeguarding your online digital life.

    Download PDF
  • Messaging Do's and Don'ts


    Messaging serves as a primary mode of communication in both our personal and professional lives. However, quite often we can be our own worst enemy when it comes to text messaging safely and securely. Learn the most common mistakes people make and how you can avoid them in your day-to-day lives.

    Download PDF
  • QR Codes


    Have you ever wondered what those squares of dots or bars called "QR codes" are all about? You most likely have seen them posted on websites, printed on posters, used as mobile tickets, or on restaurant tables. How do these work, and are there risks you should be worried about? Let's find out.

    Download PDF
  • The Power of the Passphrase


    Are you tired of constantly creating complex passwords? Frustrated with having to remember and type all those characters, symbols and numbers? Well, we have a solution for you: the ever-powerful passphrase!

    Download PDF
  • I'm Hacked, Now What?


    The internet can be overwhelming, with new technologies changing all the time. No matter how safe you try to be, sooner or later you may be unfortunate enough to get hacked. The sooner you detect something bad has happened, and the faster you respond, the more you can minimize the impact. Below are signs that you may be hacked and if so, suggestions to resolve it.

    Download PDF
  • The Power of Updating


    Cyber attackers are constantly looking for and finding new vulnerabilities in the software you use every day. A vulnerability is a mistake or weakness in how software was developed. This software may run your laptop, the mobile apps on your smartphone, or perhaps even the software in your thermostat. Cyber attackers take advantage of and exploit these software vulnerabilities, allowing them to remotely break into systems, including the ones you use. At the same time, the vendors who create the d

    Download PDF
  • Online Security for Kids


    Our kids' lives are online today more than ever, from socializing with friends and gaming, to online learning and education. So how can we help our kids make the most of online technology, safely and securely?

    Download PDF
  • The Power of Password Managers


    Like most people, you likely find creating, managing, and remembering all your different passwords a daunting task. It seems like every website has different password rules and many require additional security measures such as security questions. Wouldn’t it be great if there was a single solution to take care of all your password problems? There is. It’s called a password manager.

    Download PDF
  • Stop Those Phone Call Scams


    David was busy watching his favorite streaming series when he got a phone call from a number he did not recognize. The area code was the same as his, so he assumed it was someone local and answered the phone. Right away David was asked to confirm his full name. The caller then stated that he was from the police department and that a warrant had been issued for David’s arrest. David’s taxes were outstanding and if they were not paid in the next 24 hours, the police would have to arrest him. David

    Download PDF
  • College Parents: Don’t Leave Money on the Table!

    07/12/23 / Anita Drentlaw, CPA, president & CEO

    My daughter Kayla will be starting her second year at the University of St. Thomas in September. With her first year under her belt, our family knows what to budget – and borrow – to pay for her college.

    Read More  
  • Securing Your Financial Accounts


    Your financial accounts are a primary target for cyber-criminals. You have money, and they will do anything to steal it. By financial accounts, we mean not only your checking or savings accounts, but also investments, retirement, and online payment accounts like PayPal. Fortunately, with some simple, fundamental steps, you can protect yourself.

    Download PDF
  • Artificial Intelligence: What to Know


    Artificial Intelligence (AI) describes systems programmed to think and respond like humans. In fact, we asked the AI solution ChatGPT that very question and got this response.

    Download PDF
  • Scareware: A Story


    Warning! Your computer is infected with Black Basta ransomware. Call this phone number right away to fix your computer! - If you saw this warning pop-up on your computer, would you call the phone number?

    Download PDF
  • Digital Spring Cleaning in 7 Simple Steps


    We often hear of the term “spring cleaning,” the time of year when we go through our belongings and organize our house and lives in preparation for the upcoming summer. This is also the perfect time to take an annual review of your digital life. The following seven simple steps, taken once a year, will go a long way toward ensuring you can make the most of technology, safely and securely.

    Download PDF
  • Do I Need Security Software?


    When you bought a new computer years ago, you often had to install additional security software on your computer to help ensure it was secure against cyber attackers. However, most of today’s computers and devices have numerous security features already built into them, such as automatic-updating, firewalls, disk encryption, and file protection. In addition, Microsoft provides on Windows computers security functionality called Microsoft Defender, which includes additional features such as anti-v

    Download PDF
  • New Market Bank Chosen ‘Best Bank’ in Lakeville Sun Thisweek Readers’ Choice Awards for Third Consecutive Year

    Bank Also Voted ‘Best Mortgage Lender-Broker’ for the First Time


    For the third consecutive year, the readers of the Lakeville Sun Thisweek have chosen New Market Bank the “Best Bank” in the publication’s 2023 Readers’ Choice Awards. The bank was also voted the “Best Mortgage Lender-Broker” for the first time. The results were announced in a special section of the newspaper published today.

    Read More  
  • New Market Bank Community Giving Totals More than $25,000 in 2022


    Local, family-owned New Market Bank, with locations in Lakeville, Prior Lake and Elko New Market, announced today that it contributed $25,431 to local nonprofit organizations, schools and community initiatives in 2022. The total includes bank donations, sponsorships of various fundraising events, donations by employees and customers, which the bank matched, and special requests.

    Read More  
  • Biometrics - Making Security Simple

    Do you hate passwords? Are you tired of constantly logging into new websites or can’t remember all of your complex passwords? Frustrated by having to generate new passwords for new accounts or having to change old passwords for existing accounts? We have good news for you. There is a solution called biometrics that helps make cybersecurity easier for you. Below we explain what biometrics are, how they make your life simpler and why you will start seeing more of them.

    Download PDF
Showing Results 1 - 20 of 132