blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

CoreTech Staff

CoreTech Staff
Connect with me:

Author's Posts

Stay Alert to Compromised Credentials with Dark Web Monitoring

CoreTech Staff
Do you know if your CEO’s email username and password are being sold on the dark web right now? How would you? Eventually, you’ll find out when you have to prevent finance from wiring a hacker - posing as your CEO - large sums of money. Or, you may find out after finance has already fallen for a CEO fraud phishing scam and wired a hacker money… But if there is a way for you to know when your CEO’s credentials are being sold in the first place, you can stop the scam before it even starts. Well, ...
Read More
Topics: Security Threats, Data Breach, Network Security

Is that a UPS Package Notification or a Phishing Email? 4 Ways to Tell

CoreTech Staff
‘Tis the season for online shopping. As the volume of online sales increases, so do the frequency of phishing emails disguised as popular online retailers and delivery services. It’s important to remember that a cyber criminal’s goal is to get you to click before you consider the possibility that the email you’ve received could be fraudulent. This is why it’s important to take the time to really look at emails before clicking any links or downloading attachments — especially if an email is ...
Read More
Topics: Staff Training, Security Threats

Why Your Business Needs an MSP that Provides IT Consulting

CoreTech Staff
If technology is an integral part of running your business — as it is for most businesses today — you shouldn’t restrict yourself to only seeing your IT Managed Service Provider when something is broken. Proactive planning and IT consulting should occur regularly in order to align your security solutions and business technology with your company’s plans for growth. If your MSP’s only focus is on fixing your technology after it breaks, you'll end up with recurring issues and technology that ...
Read More
Topics: Owners & Managers, Our Company, Trends

6 Tips for Safely Shopping Online for the Holidays

CoreTech Staff
As we make our way into the holiday season and start thinking about what we're buying everyone, it’s important to heighten our awareness of who we’re giving our credit card information to. Don’t let cyber criminals ruin your holiday celebrations! Take a minute to remind yourself, your friends, and your family how to keep personal information safe while online shopping for holiday gifts.
Read More
Topics: Security Threats, Trends

Are Your IT Staff About Ready to Quit?

CoreTech Staff
According to Ponemon Institute, 65% of IT and security personnel are considering changing jobs or careers. This is due to their ever-increasing workload, the requirement of being on call 24/7, overload from constant notifications and alerts, and the pressure of taking on continuously-growing security threats. It's easy to see how all these stressors are mounting to create an unmanageable work environment. If your internal IT staff are getting burnt out, they’re not alone and it's time for ...
Read More
Topics: Owners & Managers, The Workplace, Trends

What's Giving Business Owners Nightmares this October? Cyber Security Threats

CoreTech Staff
October is Cyber Security Awareness Month! At CoreTech, we take cyber security seriously, so we talk about it A LOT. Our goal is for everyone we encounter to not only be aware of the magnitude of the cyber security threat landscape, but also that they have the tools and plans in place to prevent cyber attacks and security breaches. We have a lot of resources available on our website and realize the magnitude of cyber security can quickly become overwhelming. So, we wanted to take you on a ...
Read More
Topics: Staff Training, Security Threats, Data Breach, Owners & Managers, Network Security

Benefits of Using Microsoft Teams

CoreTech Staff
Teams is Microsoft's cloud-based communication platform that offers chat, video and audio calling, file sharing, and collaborative file editing. Since it's hosted in the cloud, you can access it on any device, from anywhere you have an internet connection. The benefits of Microsoft Teams apply to businesses of any size and assist in facilitating effective communication between teammates, whether they're in the next cubicle over or across the country.
Read More
Topics: Microsoft Products, Trends

A New First Line of Defense: Umbrella DNS Filtering

CoreTech Staff
When thinking about cyber security threats, does it ever concern you how many threats are sitting out there, just on the other side of your firewall? What if we told you that your business could expand that cyber security shield further out — away from your internal network? The more space placed between your data and bad actors, and the more chances your security applications have to spot and stop malicious code before it acts, the better. That’s why we’re excited to offer Cisco Umbrella DNS ...
Read More
Topics: Cloud, Trends, Network Security

How to Prevent a Ransomware Attack on Your Mobile Phone

CoreTech Staff
Although it’s not as common as ransomware on computers, mobile phone-based ransomware is out there. A recently developed strain of SMS ransomware spreads the instant it’s clicked. It gets onto the victim’s phone, finds any and all contacts and sends all of them a personalized text message, telling them there are compromising pictures of them on an application and providing them with a link. If the recipient of the text clicks the link, not only are all their contacts now sent the same message, ...
Read More
Topics: Staff Training, Security Threats

The Importance of Mobile Device Security

CoreTech Staff
One of your sales reps just made it back to the office after a morning jam-packed with meetings. While speaking with his manager about all the conversations he had with current and potential clients, he realizes that he has no idea where his tablet went…. He knows he had it at stops one and two, but after that, he can’t recall if he used his tablet or his smartphone. Now, beyond the monetary expense of the tablet itself and the time spent configuring the proper applications, the most concerning ...
Read More
Topics: Data Breach, Trends, Network Security