banner-section
CALL US 402.398.9580

How many cybercriminals does it take to steal an identity?

Alyssa Sisco
Erase the stereotypical image of a lone, hooded man sitting in a dark room, stealing information to exploit for money. Cybercrime has become a well-oiled machine comprised of networks of organized tiers. In essence, an unethical service-based corporation, everyone has a specific job that contributes to the success of the business. Some cybercriminals are experts in hacking and stealing information, while others are good at turning that data into profit. Unfortunately for us, they have all found their way to each other and have learned that working together can be more profitable than lone-wolfing it.
Read More
Topics: Staff Training

Is your inbox a crime scene?

Alyssa Sisco

Much like the shiny lures fishermen use to attract their prey, cybercriminals use email attachments or links to try to get you to click through to malicious content. Often using cheap scare tactics, phishing scams will try to induce a quick, panicked response by making you feel like you have something to lose by not clicking on the link. The instant you click, you open yourself up to malware attacks that can cost you financially, technologically, reputationally, and it will definitely eat up time to reverse the damage that was enacted on your device (if you are able to reverse it at all).

Read More
Topics: Staff Training, Security Threats

What's the difference between a virus and malware?

Alyssa Sisco

You may recall a plethora of headlines and news stories hyping the severity of computer viruses in the late 80's and early 90's. At this point, viruses seem more like an accepted risk you agree to when you own a computer, than the fuel for a big, scandalous headline. Most basic computer users understand that they need some form of Antivirus and to stay away from dicey websites. But with criminal programmers and hackers coming up with new, more aggressive code all the time, is that true today?

When diving into the world of computer safety, a bunch of technical terms start getting thrown around. To most, the term virus has become more of an overarching idea that it is the cause for any malfunction or breakdown your computer incurs, despite its actual definition.

Read More
Topics: Staff Training, Network Security

Quick tip: How to set your favorite search engine as your default

Alyssa Sisco
When you open up your web browser with the intent to search for something, it can be irritating to have  your computer open a search engine you don't like or are not familiar with. Those who regularly search for information on the web usually have a preferred search engine. Below you will find some steps to take when your web browser default is not what you want it to be.
Read More
Topics: Staff Training

Why ransomware education is important for your business

Emily Moulder

From ransomware and malware to email and financial data hacks, business data and personal information are the main targets of most cyber criminals. One of the greatest threats to your information security comes from your employees lack of knowledge on the subject, and hackers know that. They send malicious emails to your employees hoping they won't know the difference between a fake and real email. Educating your entire staff on cyber attacks and what they look like could be the difference in safe online use and paying millions of dollars ransom.

Read More
Topics: Staff Training

Meet the team: Lauren Hunter

Lauren Hunter


1. Tell me about your position at CoreTech? What do you do on a daily basis? How long have you been here?

Read More
Topics: Staff Training

6 reasons to train your staff on security basics

Chris Vilim
Owner to owner, I have some advice for you…stepping up training on security basics is one of the most important training sessions you can send your staff to this year. And here are the six strong reasons why…
 
1. Speed up recovery time and save money

You are not only avoiding security threats by training your employees on the importance of security, you’re also providing them with the knowledge of what to do if their system becomes compromised. For example, if an employee makes the mistake of clicking on an email containing malware, the chances of them realizing their error quickly and contacting IT support staff greatly increases. By taking this step right away, the amount of damage done is generally less compared to what it might have been had they waited to call.
 
Read More
Topics: Staff Training, Security Threats

Dark Web, Deep Web -- What's the difference?

Vee Figueroa
So how many of you watched the series CSI: Cyber before it was cancelled? Like many other detective dramas, they often talked about the “DARK WEB” (dramatic music playing in background). Sounds scary, right?? Then they throw in the term “Deep Web” to really confuse us. Although I have begun to grasp the idea of what the Dark Web is, there is still a bit of mystery to it. What I do know is that when my data was stolen from a large insurance firm I was told that my personal information was being sold on the Dark Web—not a place I want to go shopping!
 
I recently ran across an article written by the Microsoft in Business Team that explains the different layers of the World Wide Web that I found very interesting and informative. It not only explains the difference between the layers, but also explains the importance of good security so that your personal data does not end up on the Dark Web.
 
Article Link: Journey Through the World Wide Web
 
If you have any questions as to how to implement the recommendations or would like to discuss any vulnerabilities you may have, please give us a call at 402.398.9580. We would be happy to assist you!
Read More
Topics: Staff Training, Security Threats

August Quick Tip

Brooke Nielsen
Organize your notes with OneNote 2016!

OneNote is a digital note taking application that allows users to take notes in a free form or more organized manner, depending on their style. Notes taken here can easily be located, reorganized, printed, and shared between users. Using OneNote, users are also able to simply add drawings, screen clippings, audio clips, and even handwritten notes using a stylist. Notes saved in OneNote can then be found on any device, making them more accessible and portable.
 
Today, we are going to discuss just a few basic tasks that can be accomplished using OneNote 2016.
 
Read More
Topics: Staff Training

Are you using your email's deleted folder to file?

Wynn Obermeyer
A ridiculous, illogical, absurd story...
 
I would like to tell you the story about an organizer, her name was Olivia. Olivia hated the fact that all of her important papers: birth certificates, her children’s immunization records, passports, and automobile titles were not stored in one place. Olivia then gathered all of these important documents together and placed them all in a red file folder labeled “Important Documents.”  Now, Olivia needed to determine the best place to store the red file folder. “Ah ha!” she thought. “I will store the folder in the one place I see every day, the kitchen trash can.” A week later, Olivia needed the red file folder labeled “Important Documents” to obtain what she needed to enroll her children in school. Imagine Olivia’s shock and panic when she saw that the kitchen trash can was EMPTY.  “Where did the red folder go?” Olivia’s husband had put the trash out for trash pickup the previous day. Olivia was furious with her husband, “Didn’t you see I had labeled the red file folder in the trash can ‘Important Documents’ how could you throw that away?”
Read More
Topics: Staff Training