banner-section
CALL US 402.398.9580
Alyssa Sisco

Alyssa Sisco

As a Marketing Coordinator at CoreTech, Alyssa Sisco supports client communication efforts, and is responsible for creation of content assets, enCore newsletter, and marketing collateral.
Connect with me:

Author's Posts

Why a Business Continuity and Disaster Recovery Plan is a must

Alyssa Sisco

Most often, we deal with disasters like ransomware infections or down servers. But lately, Nebraska residents and businesses are combating severe flooding. Although natural disasters are statistically less likely to destroy your tech equipment than malware, we have recently seen firsthand just how devastating natural disasters can be when they do strike. In fact, this image was taken by CoreTech staff member, Mike, near his home this week.

When catastrophes like flooding occur, we become panicked about loss of communication with customers, vendors and especially staff. Since disasters are unpredictable and have the potential to occur at any time, business owners must always be prepared for the worst. With a Business Continuity and Disaster Recovery (BCDR) plan in place you will know what to do when disaster strikes. Putting a whole BCDR plan together may seem overwhelming, but we're here to help!

Read More
Topics: Owners & Managers

Is Unified Communications worth the investment?

Alyssa Sisco

Over 46% of companies are increasing their IT budget to invest in Unified Communications (UC). But, why? If so many businesses are convinced UC is the right place to invest their money, there must be some compelling reasons.

So, let’s take a look at your business. What are your goals for the coming year(s)? Are you looking to improve productivity, efficiency, collaboration, customer service or client retention? Is your business currently growing or adding options for remote work? If this sounds like the vision you’re working toward, UC could provide the tools you need to get there.

Read More
Topics: Equipment Purchases, Trends, Phone Systems

Do external devices have access to your business's internal network?

Alyssa Sisco

Any infected device that is connected to your internal network has the potential to infect all the other devices on that network. Last week, a third-party vendor brought in a device that when connected to CHI Health’s network, introduced malware to their system. The virus spread to different devices at some of their hospitals and clinics and affected browsers attempting to connect with the health system’s network.

Read More
Topics: Security Threats, Network Security

Do you know if your CEO’s email username and password are being sold on the dark web right now?

Alyssa Sisco

Do you know if your CEO’s email username and password are being sold on the dark web right now? How would you? Eventually, you’ll find out when you have to prevent finance from wiring a hacker - posing as your CEO - large sums of money. Or, you may find out after finance has already fallen for a CEO fraud phishing scam and wired a hacker money… But if there is a way for you to know when your CEO’s credentials are being sold in the first place, you can stop the scam before it even starts. Well, thankfully there is a way you can do this. At CoreTech, we offer Dark Web ID Credential Monitoring to detect and notify you of compromised credentials in real time.

Read More
Topics: Security Threats, Data Breach, Network Security

What we can learn about cybersecurity from the government shutdown

Alyssa Sisco

Amid the current government shutdown, over 80 government websites are either down or insecure. With no IT staff around to renew their TLS (Transport Layer Security) certificates, many government websites are being left open to vulnerabilities. Some of the sites are set up so that they become inaccessible to the public if their TLS certificates are not up-to-date. Yet, others simply warn users that the site is not secure, then allows you to bypass the warning and continue onto the site. Once on an insecure site, users will be vulnerable to man-in-the-middle attacks.

Read More
Topics: Owners & Managers, Network Security

What is VoIP? How does it benefit your business?

Alyssa Sisco

Would you be surprised to find out you're already using VoIP? Unless you live on a deserted island, VoIP has already become a part of your daily life--you just may not have realized it!  Since Voice over Internet Protocol (VoIP) phones offer the same functionality as traditional, analog phones, you’re not going to see a difference in the way you make or receive calls. The difference is in the way the information travels. It simply takes analog audio signals and transmits them over the internet instead of utilizing analog electrical waves. Since Information is traveling over an IP network, VoIP phones are able to offer a wider variety of features such as voicemail to email, call forwarding, twinning, ring groups and more. Read on to discover the different ways your business could utilize VoIP services.

Read More
Topics: Equipment Purchases, Phone Systems

10 tips for tightening the financial controls of your business

Alyssa Sisco

Recently, it has come to light that Save the Children Federation was swindled into wiring $1 million to cybercriminals. The money was allegedly going to buy solar panels for health centers in Pakistan, which is well within the scope of the organization’s standard operations. Unfortunately, the transaction was not uncovered as fraudulent until a month after it occurred, thus they were unable to stop the cybercriminals from making off with the funds.

Read More
Topics: Staff Training, Security Threats, Owners & Managers

5 tech tips to keep your business safe through the Midwestern winter

Alyssa Sisco

Today is the official first day of winter! As nice as it sounds to get all wrapped up in blankets with a warm drink and wait out the next few months, we have things to accomplish! But unsurprisingly, Nebraska winter weather isn’t always on board with our plans. Sometimes it’s the snow, other times the ice, and occasionally even a power outage can get in our way. So, let’s get your business prepared for the unpredictability of winter in the Midwest, now!

Read More
Topics: Owners & Managers, The Workplace

Meet the Team: Barry Stackhouse

Alyssa Sisco

Say hello to Barry! As an IT Manager, he is responsible for overseeing the technology needs of a handful of clients. He manages tickets and projects for his clients and provides support and services when they affect a larger group of users or a business as a whole. Barry and his wife have four kids themselves and a very large extended family. They recently hosted Thanksgiving at their house for more than 50 people! For some more interesting facts about Barry, check out his video!

Read More
Topics: Our Company

Monitor internal threats with Cyber Hawk

Alyssa Sisco

Let’s say you eat healthy, exercise, drink water, get eight hours of sleep every night, take vitamins and get your flu shot. Can you be 100% certain that you’re not going to get the flu this year? No. But each step you take towards being healthy, strengthens your immune system and lowers your risk of getting sick. In IT, we call this a layered approach. There is no one tool you can use to guarantee your business’s safety from a cyber-attack, but you can take multiple tools and put them together in a way that creates a strong defense. If a hacker is able to get past one of your layers of defense, they should be stopped by the next layer of security. Many of today’s internal security threats can’t be prevented simply by a firewall or antivirus.

Read More
Topics: Network Security