banner-section
CALL US 402.398.9580

Has my email address been spoofed?

Marco Ren

If you’ve ever experienced someone complaining about you sending them “nasty” emails that you never sent – you’re not alone. Some of you may even have received an email appearing to be from yourself, claiming that your PC has been hacked and demanding a ransom in the form of bitcoin. In these situations, your email account may have been compromised. However, if you contact your IT support team and they are certain that your email is secure and has not been hacked, there is another possibility – email spoofing.

Read More
Topics: Staff Training, Security Threats

Is Unified Communications worth the investment?

Alyssa Sisco

Over 46% of companies are increasing their IT budget to invest in Unified Communications (UC). But, why? If so many businesses are convinced UC is the right place to invest their money, there must be some compelling reasons.

So, let’s take a look at your business. What are your goals for the coming year(s)? Are you looking to improve productivity, efficiency, collaboration, customer service or client retention? Is your business currently growing or adding options for remote work? If this sounds like the vision you’re working toward, UC could provide the tools you need to get there.

Read More
Topics: Equipment Purchases, Trends, Phone Systems

Do external devices have access to your business's internal network?

Alyssa Sisco

Any infected device that is connected to your internal network has the potential to infect all the other devices on that network. Last week, a third-party vendor brought in a device that when connected to CHI Health’s network, introduced malware to their system. The virus spread to different devices at some of their hospitals and clinics and affected browsers attempting to connect with the health system’s network.

Read More
Topics: Security Threats, Network Security

Is a cloud-based phone system right for your business?

Sue Sims

Cloud technology is becoming more prevalent in small and midsize businesses. Not just in regard to storage or hosted IT applications, but in regard to phone systems as well. Cloud-based, UCaaS or “hosted” telephone systems are certainly rising in popularity. So, are they the best fit for your business? Read on and we'll talk about some things to consider.

Read More
Topics: Phone Systems

Why you should use a single managed services provider

Derek Warak

One MSP for voice and data is almost necessary in today’s world. Now that everything is connected through integrations, if one application stops working, it can hold up your entire process. You need to be able to have issues identified and resolved as quickly as possible, to maintain the flow of business. Not only does downtime cut down on productivity, it also puts people in a grumpy mood. According to a survey from the National Small Business Association, 41% of companies said that their biggest technology challenge is “the time it takes to fix issues”. Everything seems to rely on technology so keeping it running as smoothly as possible is one of the most important aspects of business.

Read More
Topics: Owners & Managers, Trends

Do you know if your CEO’s email username and password are being sold on the dark web right now?

Alyssa Sisco

Do you know if your CEO’s email username and password are being sold on the dark web right now? How would you? Eventually, you’ll find out when you have to prevent finance from wiring a hacker - posing as your CEO - large sums of money. Or, you may find out after finance has already fallen for a CEO fraud phishing scam and wired a hacker money… But if there is a way for you to know when your CEO’s credentials are being sold in the first place, you can stop the scam before it even starts. Well, thankfully there is a way you can do this. At CoreTech, we offer Dark Web ID Credential Monitoring to detect and notify you of compromised credentials in real time.

Read More
Topics: Security Threats, Data Breach, Network Security

What we can learn about cybersecurity from the government shutdown

Alyssa Sisco

Amid the current government shutdown, over 80 government websites are either down or insecure. With no IT staff around to renew their TLS (Transport Layer Security) certificates, many government websites are being left open to vulnerabilities. Some of the sites are set up so that they become inaccessible to the public if their TLS certificates are not up-to-date. Yet, others simply warn users that the site is not secure, then allows you to bypass the warning and continue onto the site. Once on an insecure site, users will be vulnerable to man-in-the-middle attacks.

Read More
Topics: Owners & Managers, Network Security

What is VoIP? How does it benefit your business?

Alyssa Sisco

Would you be surprised to find out you're already using VoIP? Unless you live on a deserted island, VoIP has already become a part of your daily life--you just may not have realized it!  Since Voice over Internet Protocol (VoIP) phones offer the same functionality as traditional, analog phones, you’re not going to see a difference in the way you make or receive calls. The difference is in the way the information travels. It simply takes analog audio signals and transmits them over the internet instead of utilizing analog electrical waves. Since Information is traveling over an IP network, VoIP phones are able to offer a wider variety of features such as voicemail to email, call forwarding, twinning, ring groups and more. Read on to discover the different ways your business could utilize VoIP services.

Read More
Topics: Equipment Purchases, Phone Systems

3 security approaches every small business needs

Bill Weber

Hackers are constantly honing their skills and becoming more dangerous, putting your small business at risk. The standard level of prevention from the past is not enough to protect all technology users today. Avoiding ransomware and phishing emails boils down to three basic approaches:

  1. Good cyber awareness and end-user training
  2. Following desktop best practices
  3. Routine testing of backup and recovery plans
Read on and we'll cover how your business needs to prepare so that you may avoid and minimize a security breach which impacts your business flow. 


Read More

10 tips for tightening the financial controls of your business

Alyssa Sisco

Recently, it has come to light that Save the Children Federation was swindled into wiring $1 million to cybercriminals. The money was allegedly going to buy solar panels for health centers in Pakistan, which is well within the scope of the organization’s standard operations. Unfortunately, the transaction was not uncovered as fraudulent until a month after it occurred, thus they were unable to stop the cybercriminals from making off with the funds.

Read More
Topics: Staff Training, Security Threats, Owners & Managers