Showing Results 1 - 20 of 64
  • I’m Hacked. Now What?

    No matter how secure you are, sooner or later you may have an accident and become hacked. Here are clues you might have been hacked and if so, what to do. If you suspect you have been hacked, stay calm; you will get through this.

    Download PDF
  • New Round of PPP Funding Available

    The Economic Aid to Hard Hit Small Businesses, Nonprofits and Venues Act, signed into law December 27, 2020, included more funding for the SBA’s Paycheck Protection Program (PPP). Most community banks, including New Market Bank, will be in the second wave of lenders allowed access to the application portal. Once we know when our access opens, we will update our website and announce it on social media. According to the SBA, plenty of funds are available - there's no need to panic and apply immedi

    Read More  
  • Meeting Customer Needs Both Digitally and In-Person

    Anita Drentlaw

    The unfortunate physical restrictions of 2020 as well as our culture’s ever-growing shift to digital platforms have increased New Market Bank’s need to serve our customers whenever, wherever, and however they prefer. Now more than ever, we must offer our customers a range of digital banking tools while still providing dedicated, in-person banking for those who prefer to stop by our physical locations in Lakeville, Prior Lake, and Elko New Market.

    Read More  
  • Securing Wi-Fi at Home

    To create a secure home network, you need to start by securing your Wi-Fi access point (sometimes called a Wi-Fi router). This is the device that controls who and what can connect to your home network. Here are five simple steps to securing your home Wi-Fi to create a far more secure home network for you and your family.

    Download PDF
  • Securing the Generation Gap

    Trying to securely make the most of today’s technology can be overwhelming for almost all of us, but it can be especially challenging for family members not as used to or as familiar with technology. Therefore, we wanted to share some key steps to help secure family members who may be struggling with technology and might misunderstand the risks that come with using it.

    Download PDF
  • Virtual Conferencing Safely and Securely

    With so many of us now working from home, you are most likely finding yourself remotely connecting with your co-workers using virtual conferencing solutions like Zoom, Slack, or Microsoft Teams. Your family members - perhaps even your children – may also be using these same technologies to connect with friends or for remote learning. Regardless of why you are connecting, here are key steps you can take to make the most of these technologies safely and securely.

    Download PDF
  • Social Engineering Attacks

    A common misconception about cyber attackers is that they use only highly advanced tools and techniques to hack into peoples’ computers or accounts. Cyber attackers have learned that the easiest ways to steal your information, hack your accounts, or infect your systems is by simply tricking you into doing it for them using a technique called social engineering.

    Download PDF
  • Fake News

    Generally speaking, fake news is a false narrative that is published and promoted as if it were true. Anyone with an agenda can publish falsehoods as if they were truths. The motivations as to why people create and distribute fake news are as numerous as there are individual opinions.

    Download PDF
  • Community Banking: The Treat That Keeps on Giving

    Anita Drentlaw

    Every now and then, a trick can draw a bit of glee (especially during Halloween). But no one likes to have the wool pulled over their eyes, especially when it’s a wolf disguised in sheep’s clothing. That’s why New Market Bank focuses on the “treats” that distinguish us as trusted lenders and keep our customers coming back for more.

    Read More  
  • Community Banks Live Community Service

    Anita Drentlaw

    Our commitment to the community is more than checkbook philanthropy. Volunteering for local charities and not-for-profit entities are hallmarks of every community bank. We pride ourselves on working alongside customers, business owners, nonprofits and municipalities to create better places to live, raise our families and work.

    Read More  
  • Securing Kids Online

    Kids' lives are online more than ever, from socializing with friends and interacting with family to online learning and education. As parents we want to make sure they do so in a safe and secure manner. However, this is hard as many of us never grew up in such an online environment like this. Below we cover key steps on how you can help kids make the most of online technology safely and securely.

    Download PDF
  • Aligning Your Values and Purchasing Decisions

    Anita Drentlaw

    People are always asking me for recommendations: “Anita, what’s a good Lakeville family restaurant? Where should I get my oil changed in Prior Lake? Where should I go for a special gift for my sister-in-law?” I never miss a beat because my answers are always the same: I keep my business small and local.

    Read More  
  • The Power of Updating

    You may not realize it but cyber attackers are constantly looking for and finding new vulnerabilities and weaknesses in the software people use every day.  This software may run your laptop, could be the mobile apps you use on your smartphone, or perhaps even the software in your baby monitor or other devices inyour home.  Bad guys take advantage of these software weaknesses, allowing them to remotely break into devices around the world.  At the same time, the software and device vendors are con

    Download PDF
  • Password Managers

    One of the most important steps you can take to protect yourself is to use a unique, strong password for each of your accounts and apps.  Unfortunately, it's almost impossible to remember all of the different passwords.  In addition, we know it's time consuming to constantly have to type in your passwords at different sites, generate new passwords, track the answers to all your security questions, and numerous other factors.  However, there is a solution that will make your life both much simple

    Download PDF
  • Digital Spring Cleaning

    Most of us are so looking forward to spring!  The landscape starts to take shape, flowers start to bloom, and, for many, there's a desire to spring clean.  While it might be easy to see the need to purge and tidy up, realizing the need to also digitally declutter isn't so apparent.  Here are some quick tips to get your digital life in order and establish new digital habits.  

    Download PDF
  • Social Media Privacy

    Most people would never consider walking into a crowded room and loudly broadcasting to total strangers all the details of their private life - from their health issues to their family and friend's names, ages, jobs, or school locations. But often these same individuals won't think twice about posting that same information on social media. The ramifications of sharing too much can have an impact not only on your personal and professional life but also the lives of your family and friends.

    Download PDF
  • Digital Inheritance

    Have you ever thought about the uncomfortable question, What happens to our digital presence when we die or become incapacitated? Many of us have or know we should have a will and checklists of what loved ones need to know in the event of our passing. But what about all of our digital data and online accounts? Should we consider some type of digital will? Should we create a "digital inheritance" plan?

    Download PDF
  • Messaging / Smishing Attacks

    One of the most common ways cuber attackers attempt to trick or fool people is by scamming you in email attacks (often called phishing) or try to trick you with phone calls. However, as technology continues to advance bad guys are always trying new methods, to include tricking you with messaging technologies such as text messaging, iMessage/Facetime, WhatsApp, Slack, or Skype. Here are some simple steps to protect yourself and spot / stop these common attacks.

    Download PDF
  • Four Simple Steps to Staying Secure

    Making the most of technology safely and securely can seem overwhelming and confusing. However, regardless of what technology you are using or how you are using it, here are four simple steps that will help you stay secure.

    Download PDF
  • Scamming You Through Social Media

    Many of us have received phishing email, either at work or home. These emails look legitimate, such as from your bank, your boss, or your favorite online store, but are really an attack attempting to pressure or trick you into taking action you should not take, such as opening an infected email attachment, sharing your password, or transferring money. The challenge is, the more savvy we become at spotting and stopping these email attacks, the more cyber criminals try other ways of contacting a

    Download PDF
Showing Results 1 - 20 of 64