3 Please read important messages

Top 10 Cybersecurity Tips for Holiday Shopping

For most of us, the holiday season is about friends, family, food—and shopping! Unfortunately, while you’re looking for holiday deals, the bad guys are...

Christine Korpi Hired as Vice President, Compliance Officer

Minnesota Lakes Bank announced that Christine Korpi has been hired as Vice President, Compliance Officer of Minnesota Lakes Bank and will reside in the Delano...

Steer Clear of Fake Login Pages

Grand Rapids State Bank has rolled out an update of its online banking service effective Monday, February...

Exploiting the Coronavirus: Financial Relief Scam Targeting Organizations

The coronavirus pandemic continues to impact organizations across the globe. This hardship gives cybercriminals the perfect bait: a promise of financial...

Exploiting the Coronavirus: Supermarket Spoofs

Grocery delivery services have been quite popular during the COVID-19 pandemic. These services help support social distancing, reduce the number of shoppers in...

Personally Identifiable Information (PII)

Sensitive information is privileged information which – if compromised through alteration, corruption, loss, misuse, or unauthorized disclosure – could...

Exploiting the Coronavirus: Watch Out for Fake Charities!

With the Coronavirus pandemic still raging on, people all over the world are doing what they can to help one another. The bad guys are hoping to use this...

Exploiting the Coronavirus: Phony COVID-19 Tracking

Countries around the world are developing COVID-19 tracking applications for mobile devices. These apps use digital tracking to help identify and notify users...

Exploiting the Coronavirus: Netflix is More Popular Than Ever – Especially with Cybercriminals

Long before the COVID-19 pandemic, bad guys were spoofing Netflix emails in an attempt to collect your sensitive information. With more and more people looking...

Unexpected Emails

When you receive an email from an online service or business partner that you are not expecting, proceed with caution. For example, if you receive an email...

Exploiting the Coronavirus: Malicious Zoom Installer

Whether you’re working from home or trying to stay in touch with loved ones, video conferencing apps like Zoom are becoming the new normal. Cybercriminals...

May Construction in Mound

Our Mound office is in the final stages of a full remodel in order to serve you better. We can’t wait for you to see the new space in...