banner-section
CALL US 402.398.9580

BEC fraud: The threat you can't afford to ignore

Brooke Nielsen
Business E-mail Compromise (BEC), commonly known as “CEO fraud,” is a rapidly increasing concern affecting companies’ financial and data security today.

What exactly is BEC? It has been defined as a scam that targets businesses working with foreign suppliers and/or businesses that regularly use wire transfer payments. Scammers skillfully gain access to and impersonate company executives, attorneys, or suppliers through e-mails to fraudulently authorize the transfer of company funds. Payments are then wire transferred from their victims to foreign banks where they are quickly dispersed to the scamming party.

With so many businesses being affected, including The Scoular Co., one of Omaha’s largest companies, it is important to educate yourself and your employees about BEC.
Read More
Topics: Staff Training, Security Threats, Data Breach

Arm your employees with these 5 key security basics

Vee Figueroa
There are numerous ways owners and managers protect their company from security threats. Hopefully you recognize some of these security solutions which include: use of a commercial grade firewall, endpoint protection software, proper patching, updating software programs, and—last but not least—strong data backup.
 
All these security solutions are key to securing your network and data, however one task often ignored is employee education!  As an employer you will want to be certain your employees understand how important securing data and your network is to company productivity. Once you have stablished the importance of security, then train employees on the basics.
 
Here are the “5 key security basics” to train and implement with your staff. All of these will aid in protecting your network and business data.
Read More
Topics: Staff Training, Security Threats

How to avoid mobile security risks in 2016

Megan Thiemann

Keeping private information safe has always been a priority, however more than ever, smartphone threat protection is of the utmost importance. According to Pew Research Center, 68 percent of American adults own a smartphone. This number only continues to grow as more businesses adopt the idea of BYOD. The more that employees and contractors use mobile devices to access organizational systems, application and data, the more important it is to protect such access. Here are CoreTech’s tips on how to avoid mobile security risks.

Read More
Topics: Staff Training, Security Threats

Do you need a vacation after your vacation?

Vee Figueroa

Getting help with your email hangover.

So you have just gotten home from a very relaxing, much needed vacation.  You feel great! The work tension in your body is gone. On Monday you walk into your office still thinking of the beautiful scenery you’ve just encountered. You turn on your PC, open Outlook and…POW. Relaxation is gone!!

What seems like a thousand emails start piling up. Some of them are junk, some very important, and some are needed information to use later. You dread the thought of sorting through each email to decide what actions must be taken.

We’ve all been there.

Read More
Topics: Staff Training

Working from home is easy (and productive)

Vee Figueroa

So here we are on the verge of spring (thank goodness), and I do have to say this winter gave us some perilous drives to work. In fact, one so icy that my boss declared it a “work at home” day. I was relieved as I live on a hill that is not forgiving and there were no snow plows in sight!

In years past, working from home would have not have been as productive as I had files and software that I need available to get my work done. Now, there are so many different avenues to tap to be productive away from the office that working from home was not an issue!

Read More
Topics: Staff Training, Owners & Managers

Passwords are like underwear

Joel Havenridge

Almost anything you do online these days requires a password, from logging into your Facebook account to conducting online banking to managing personal and business credit card statements. Passwords are a necessity to keep your online information safe and sound. How should you protect your passwords?

  1. You shouldn’t leave them out where people can see them.
  2. You should change them regularly
  3. Don’t share them with friends.
  4. You shouldn’t loan them out!
Read More
Topics: Staff Training

Windows 7 tips, tweaks, & secrets

Matt Allen

I came across a great educational resource for Windows 7. Although written when Microsoft just launched 7 and people were transitioning from Vista (or XP as the case may be), these tips are still applicable to Windows 7 today.

Now, don’t be overwhelmed by the number of tips – yes, there are 50! We’ve called out a few for you below to check out. Plus, the website is a resource you may refer back to once a week or so in order to put some time-saving features to use. Before you know it you will have implemented a lot of useful features you had never considered in the past.

Read More
Topics: Staff Training

Tired of Tiles? Log in directly to Windows 8.1 desktop!

Matt Allen

Are you having trouble navigating the tiles and simply want to log in directly to Windows 8.1? Soon Window 10 will make this a non-issue, however in the meantime, just follow these couple steps so that your desktop will appear after log in.

Read More
Topics: Staff Training

The Anatomy of a Phishing Email

Vee Figueroa

It’s exciting to receive a package in the mail with new products or deals I’ve found during some online shopping. So when I received an email about an undeliverable package to my work email address (and I was expecting a package, which was overdue), I almost didn’t think twice about it. And then, I began to wonder about the email address and was pretty certain I supplied my home email when ordering online.

Read More
Topics: Staff Training, Security Threats