banner-section
CALL US 402.398.9580

Why ransomware education is important for your business

Emily Moulder

From ransomware and malware to email and financial data hacks, business data and personal information are the main targets of most cyber criminals. One of the greatest threats to your information security comes from your employees lack of knowledge on the subject, and hackers know that. They send malicious emails to your employees hoping they won't know the difference between a fake and real email. Educating your entire staff on cyber attacks and what they look like could be the difference in safe online use and paying millions of dollars ransom.

Read More
Topics: Staff Training

Meet the team: Lauren Hunter

Lauren Hunter


1. Tell me about your position at CoreTech? What do you do on a daily basis? How long have you been here?

Read More
Topics: Staff Training

6 reasons to train your staff on security basics

Chris Vilim
Owner to owner, I have some advice for you…stepping up training on security basics is one of the most important training sessions you can send your staff to this year. And here are the six strong reasons why…
 
1. Speed up recovery time and save money

You are not only avoiding security threats by training your employees on the importance of security, you’re also providing them with the knowledge of what to do if their system becomes compromised. For example, if an employee makes the mistake of clicking on an email containing malware, the chances of them realizing their error quickly and contacting IT support staff greatly increases. By taking this step right away, the amount of damage done is generally less compared to what it might have been had they waited to call.
 
Read More
Topics: Staff Training, Security Threats

Dark Web, Deep Web -- What's the difference?

Vee Figueroa
So how many of you watched the series CSI: Cyber before it was cancelled? Like many other detective dramas, they often talked about the “DARK WEB” (dramatic music playing in background). Sounds scary, right?? Then they throw in the term “Deep Web” to really confuse us. Although I have begun to grasp the idea of what the Dark Web is, there is still a bit of mystery to it. What I do know is that when my data was stolen from a large insurance firm I was told that my personal information was being sold on the Dark Web—not a place I want to go shopping!
 
I recently ran across an article written by the Microsoft in Business Team that explains the different layers of the World Wide Web that I found very interesting and informative. It not only explains the difference between the layers, but also explains the importance of good security so that your personal data does not end up on the Dark Web.
 
Article Link: Journey Through the World Wide Web
 
If you have any questions as to how to implement the recommendations or would like to discuss any vulnerabilities you may have, please give us a call at 402.398.9580. We would be happy to assist you!
Read More
Topics: Staff Training, Security Threats

August Quick Tip

Brooke Nielsen
Organize your notes with OneNote 2016!

OneNote is a digital note taking application that allows users to take notes in a free form or more organized manner, depending on their style. Notes taken here can easily be located, reorganized, printed, and shared between users. Using OneNote, users are also able to simply add drawings, screen clippings, audio clips, and even handwritten notes using a stylist. Notes saved in OneNote can then be found on any device, making them more accessible and portable.
 
Today, we are going to discuss just a few basic tasks that can be accomplished using OneNote 2016.
 
Read More
Topics: Staff Training

Are you using your email's deleted folder to file?

Wynn Obermeyer
A ridiculous, illogical, absurd story...
 
I would like to tell you the story about an organizer, her name was Olivia. Olivia hated the fact that all of her important papers: birth certificates, her children’s immunization records, passports, and automobile titles were not stored in one place. Olivia then gathered all of these important documents together and placed them all in a red file folder labeled “Important Documents.”  Now, Olivia needed to determine the best place to store the red file folder. “Ah ha!” she thought. “I will store the folder in the one place I see every day, the kitchen trash can.” A week later, Olivia needed the red file folder labeled “Important Documents” to obtain what she needed to enroll her children in school. Imagine Olivia’s shock and panic when she saw that the kitchen trash can was EMPTY.  “Where did the red folder go?” Olivia’s husband had put the trash out for trash pickup the previous day. Olivia was furious with her husband, “Didn’t you see I had labeled the red file folder in the trash can ‘Important Documents’ how could you throw that away?”
Read More
Topics: Staff Training

July Quick Tip

Brooke Nielsen
Save time searching for e-mails by creating custom search folders that include your specified criteria!
 
Isolating messages with key phrases or peoples’ names can save the time and hassle of searching. Search folders continually gather messages using your specified criteria, and now you can view all of these messages in one place, even if they are filed in various folders.
 
For example, if your folder seeks messages regarding a person, topic or specific email (whether they are from that person or the e-mail just mentions their name), the email will begin to populate within that folder.
 
You can also use this tool to organize your e-mails regarding a company project. By naming the project in the search criteria, you can easily keep track of all related e-mails, without having to manually search for and place them into a specified folder.
 
By organizing your e-mails this way, you can decide what comes directly into your inbox and what goes to specified folders. This saves time in locating an e-mail, as well as helps you decide what to view now in your inbox versus what can wait for later.
 
Another example using this approach: you can decide to send all newsletters you receive from vendors or other companies to a specific folder, thus cleaning up your inbox and saving this reading for another day or time when you are able to keep up on your news.
Read More
Topics: Staff Training

BEC fraud: The threat you can't afford to ignore

Brooke Nielsen
Business E-mail Compromise (BEC), commonly known as “CEO fraud,” is a rapidly increasing concern affecting companies’ financial and data security today.

What exactly is BEC? It has been defined as a scam that targets businesses working with foreign suppliers and/or businesses that regularly use wire transfer payments. Scammers skillfully gain access to and impersonate company executives, attorneys, or suppliers through e-mails to fraudulently authorize the transfer of company funds. Payments are then wire transferred from their victims to foreign banks where they are quickly dispersed to the scamming party.

With so many businesses being affected, including The Scoular Co., one of Omaha’s largest companies, it is important to educate yourself and your employees about BEC.
Read More
Topics: Staff Training, Security Threats, Data Breach

Arm your employees with these 5 key security basics

Vee Figueroa
There are numerous ways owners and managers protect their company from security threats. Hopefully you recognize some of these security solutions which include: use of a commercial grade firewall, endpoint protection software, proper patching, updating software programs, and—last but not least—strong data backup.
 
All these security solutions are key to securing your network and data, however one task often ignored is employee education!  As an employer you will want to be certain your employees understand how important securing data and your network is to company productivity. Once you have stablished the importance of security, then train employees on the basics.
 
Here are the “5 key security basics” to train and implement with your staff. All of these will aid in protecting your network and business data.
Read More
Topics: Staff Training, Security Threats

How to avoid mobile security risks in 2016

Megan Thiemann

Keeping private information safe has always been a priority, however more than ever, smartphone threat protection is of the utmost importance. According to Pew Research Center, 68 percent of American adults own a smartphone. This number only continues to grow as more businesses adopt the idea of BYOD. The more that employees and contractors use mobile devices to access organizational systems, application and data, the more important it is to protect such access. Here are CoreTech’s tips on how to avoid mobile security risks.

Read More
Topics: Staff Training, Security Threats