banner-section
CALL US 402.398.9580
Alyssa Sisco

Alyssa Sisco

As a Marketing Coordinator at CoreTech, Alyssa Sisco supports client communication efforts, and is responsible for creation of content assets, enCore newsletter, and marketing collateral.
Connect with me:

Author's Posts

The risks of unpatched applications and unsupported equipment

Alyssa Sisco

Everyday more technology processes are automated, saving us from performing tedious tasks over and over. However, the technology that helps us and makes our lives easier is also used by hackers and cybercriminals to take advantage of us. Hackers use automation to build bots that continuously search the internet for unpatched and vulnerable devices to infect. In fact, almost 30% of all internet traffic is made up of bad bots such as hacking tools, impersonators, scrapers and spammers. Once a hacker finds and accesses your vulnerable computer, it only takes about 20 minutes to infect it. As soon as that one device on your network is infected, it doesn't take long before your whole network is breached.

Read More
Topics: Network Security, Equipment Purchases, Data Breach, Security Threats

Meet the Team: Tim Albertus

Alyssa Sisco

Have you met Tim? As a Systems Engineer, he spends most of his time building infrastructure and also handles a lot of the behind-the-scenes network maintenance that allows our clients to get their jobs done, in the most efficient ways for them. Additionally, for someone who works on complex, difficult issues all day, he likes to keep a balance by being a bit of a jokester and adorning his cubical in Lego figurines. Get to know Tim by checking out his video!

Read More
Topics: Our Company

Prices increasing on technology equipment with new tariffs in place

Alyssa Sisco

On September 24th, President Trump deployed 10 percent tariffs on roughly $200 billion worth of products from China. The tariffs are set to increase again to 25 percent on January 1st.

These tariffs are now increasing the cost of consumer goods across many industries in the U.S. and are expected to continue to rise. Predictably, the technology industry is no exception to these price increases.

Read More

What options do I have for using the cloud?

Alyssa Sisco

Deciding on the best cloud solution for your business requires you to really understand all of your options. But there are a lot of different terms that get thrown around when discussing the cloud. In order to be an active participant in the discussion and decision-making process, it’s important to be familiar with your options and understand the costs and benefits of each. Use this guide to get the basics down, and then reach out to us with questions you may have.

Read More
Topics: Cloud, Owners & Managers

Meet the Team: Bill Weber

Alyssa Sisco

Meet one of our newest recruits, Bill!

He has taken on the role of IT Manager and works with clients to see how we can use technology to add value to their environment, while ensuring that projects are getting done right, on-time and on-budget. Outside of work, Bill enjoys spending time with his family, whether it be by having dinner together, finding things to do around town, or even traveling to Italy. Get to know Bill by watching our latest Meet the Team video!

Read More
Topics: Our Company

Quick Tip: How to enable LastPass autofill on your phone (iOS & Android)

Alyssa Sisco

Once you start using LastPass, you don't want to stop using it. Yes, it's that helpful! The autofill feature makes it incredibly easy to log in to any account, while keeping your usernames and passwords secure. But did you know you can also use it on your phone? LastPass features allow you to not only log in to online accounts, but also log in to smartphone applications. Follow these steps to enable autofill on your Android and iOS devices.

Read More
Topics: Staff Training

How to keep your business secure while allowing staff to work remotely

Alyssa Sisco

With the right company culture and technology tools, it’s possible to work effectively and efficiently while outside of the office. Given access to email, chat, video conferencing, cloud collaboration tools, and more, there aren’t a lot of office jobs that can’t be done off-site. Studies show that flexible work options reduce turnover, improve morale and to top it all off, over two-thirds of employers report increased productivity among their telecommuters.

Taking all this into consideration, it's no wonder why the number of people spending at least some of their hours each week working remotely is continuing to rise. When a business decides that allowing their staff to work remotely could positively impact their business, there are some steps they need to take to ensure that they have the proper security measures in place. Here are a few items your business should implement to thwart a cyber attack:

Read More
Topics: Network Security, Owners & Managers, Trends

Meet the Team: Sue Sims

Alyssa Sisco

Meet Sue Sims! She is a Unified Communications (UC) Engineer. Sue programs most of the phone systems that come from us and puts together the user-guides/manuals that clients receive with their new phone systems. She also helps with the cut-over for larger jobs where we transition a whole business from an old system to a new one. Read on to learn more about one of our outstanding UC Engineers!

What do you like most about your job?

I like that I never get to a point where I know everything. I always get to learn something new every day and overcome different challenges. I started working with phone systems about 30 years ago and so much has changed since then. I started as a customer, myself, and then transitioned into installing phone systems.

Read More
Topics: Our Company

How to identify Social Engineering

Alyssa Sisco

Social engineering involves the manipulation or deception of people in order to obtain information or access they shouldn't have. Social engineers could be after a password, bank account information, access to your corporation's network or anything else that could benefit them. Their end goal could be to steal money, company secrets, to disrupt your business or to shut it down entirely.

Because social engineering preys on human behavior, it's one of the most dangerous threats to cybersecurity. Can you rely on each staff member at your company to successfully identify and protect against these attacks?

Read More
Topics: Network Security, Staff Training, Security Threats

Windows Server 2008 end of support

Alyssa Sisco

Support for Windows Server 2008 and 2008 R2 is ending on January 14, 2020.

This means that no more security updates will be developed or released after January 14, 2020. Running unsupported software on your server can leave your business vulnerable to any number of cybersecurity attacks and may keep your business from meeting compliance requirements.

Read More
Topics: Network Security, Microsoft Products