blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Alyssa Sisco

Alyssa Sisco

As a Marketing Coordinator at CoreTech, Alyssa Sisco supports client communication efforts, and is responsible for creation of content assets, enCore newsletter, and spreading the word about CoreTech's services.
Connect with me:

Author's Posts

Why your business needs an MSP that provides IT Consulting

Alyssa Sisco
If technology is an integral part of running your business — as it is for most businesses today — you shouldn’t restrict yourself to only seeing your IT Managed Service Provider when something is broken. Proactive planning and IT consulting should occur regularly in order to align your security solutions and business technology with your company’s plans for growth. If your MSP’s only focus is on fixing your technology after it breaks, you'll end up with recurring issues and technology that ...
Read More
Topics: Owners & Managers, Our Company, Trends

6 Tips for Safely Shopping Online for the Holidays

Alyssa Sisco
As we make our way into the holiday season and start thinking about what we're buying everyone, it’s important to heighten our awareness of who we’re giving our credit card information to. Don’t let cyber criminals ruin your holiday celebrations! Take a minute to remind yourself, your friends, and your family how to keep personal information safe while online shopping for holiday gifts.
Read More
Topics: Security Threats, Trends

Are Your IT Staff About Ready to Quit?

Alyssa Sisco
According to Ponemon Institute, 65% of IT and security personnel are considering changing jobs or careers. This is due to their ever-increasing workload, the requirement of being on call 24/7, overload from constant notifications and alerts, and the pressure of taking on continuously-growing security threats. It's easy to see how all these stressors are mounting to create an unmanageable work environment. If your internal IT staff are getting burnt out, they’re not alone and it's time for ...
Read More
Topics: Owners & Managers, The Workplace, Trends

What's Giving Business Owners Nightmares this October? Cyber Security Threats

Alyssa Sisco
October is Cyber Security Awareness Month! At CoreTech, we take cyber security seriously, so we talk about it A LOT. Our goal is for everyone we encounter to not only be aware of the magnitude of the cyber security threat landscape, but also that they have the tools and plans in place to prevent cyber attacks and security breaches. We have a lot of resources available on our website and realize the magnitude of cyber security can quickly become overwhelming. So, we wanted to take you on a ...
Read More
Topics: Staff Training, Security Threats, Data Breach, Owners & Managers, Network Security

Why Your Business Needs Cloud Voice

Alyssa Sisco
One of the greatest benefits of cloud technology is the promise of mobility. But how does mobility specifically benefit your business and employee productivity? Cloud voice solutions provide you with the tools to enable you to effectively conduct business from anywhere, anytime. With Cloud Voice options like Mitel MiCloud Connect, you’re able to call, chat, video conference, view call logs, voicemail and more from anywhere you have an internet connection. For more information, and a live ...
Read More
Topics: Cloud, Phone Systems

Benefits of Using Microsoft Teams

Alyssa Sisco
Teams is Microsoft's cloud-based communication platform that offers chat, video and audio calling, file sharing, and collaborative file editing. Since it's hosted in the cloud, you can access it on any device, from anywhere you have an internet connection. This communication tool is great for businesses of any size, and assists in facilitating effective communication between teammates, whether they're in the next cubical over, or across the country.
Read More
Topics: Microsoft Products, Trends

A New First Line of Defense: Umbrella DNS Filtering

Alyssa Sisco
When thinking about cyber security threats, does it ever concern you how many threats are sitting out there, just on the other side of your firewall? What if we told you that your business could expand that cyber security shield further out — away from your internal network? The more space placed between your data and bad actors, and the more chances your security applications have to spot and stop malicious code before it acts, the better. That’s why we’re excited to offer Cisco Umbrella DNS ...
Read More
Topics: Cloud, Trends, Network Security

5 Steps for Getting Your Employees Invested in Your Business's Cyber Security Initiative

Alyssa Sisco
If your employees are required to use a computer, tablet, or smartphone in order to do any aspect of their job, they absolutely need cyber security awareness training. The threat of a cyber security attack or data breach is now simply a cost of doing business in today’s world. It's no longer a question of if, now it's when will your business experience some form of cyber security attack? So, instead of leaving one of your most valuable cyber security assets defenseless in the face of phishing ...
Read More
Topics: Staff Training, Security Threats

How to Prevent a Ransomware Attack on Your Mobile Phone

Alyssa Sisco
Although it’s not as common as ransomware on computers, mobile phone-based ransomware is out there. A recently developed strain of SMS ransomware spreads the instant it’s clicked. It gets onto the victim’s phone, finds any and all contacts and sends all of them a personalized text message, telling them there are compromising pictures of them on an application and providing them with a link. If the recipient of the text clicks the link, not only are all their contacts now sent the same message, ...
Read More
Topics: Staff Training, Security Threats

The Importance of Mobile Device Security

Alyssa Sisco
One of your sales reps just made it back to the office after a morning jam-packed with meetings. While speaking with his manager about all the conversations he had with current and potential clients, he realizes that he has no idea where his tablet went…. He knows he had it at stops one and two, but after that, he can’t recall if he used his tablet or his smartphone. Now, beyond the monetary expense of the tablet itself and the time spent configuring the proper applications, the most concerning ...
Read More
Topics: Data Breach, Trends, Network Security