banner-section
CALL US 402.398.9580
Alyssa Sisco

Alyssa Sisco

As a Marketing Coordinator at CoreTech, Alyssa Sisco supports client communication efforts, and is responsible for creation of content assets, enCore newsletter, and marketing collateral.
Connect with me:

Author's Posts

How to keep your business secure while allowing staff to work remotely

Alyssa Sisco

With the right company culture and technology tools, it’s possible to work effectively and efficiently while outside of the office. Given access to email, chat, video conferencing, cloud collaboration tools, and more, there aren’t a lot of office jobs that can’t be done off-site. Studies show that flexible work options reduce turnover, improve morale and to top it all off, over two-thirds of employers report increased productivity among their telecommuters.

Taking all this into consideration, it's no wonder why the number of people spending at least some of their hours each week working remotely is continuing to rise. When a business decides that allowing their staff to work remotely could positively impact their business, there are some steps they need to take to ensure that they have the proper security measures in place. Here are a few items your business should implement to thwart a cyber attack:

Read More
Topics: Owners & Managers, Trends, Network Security

Meet the Team: Sue Sims

Alyssa Sisco

Meet Sue Sims! She is a Unified Communications (UC) Engineer. Sue programs most of the phone systems that come from us and puts together the user-guides/manuals that clients receive with their new phone systems. She also helps with the cut-over for larger jobs where we transition a whole business from an old system to a new one. Read on to learn more about one of our outstanding UC Engineers!

What do you like most about your job?

I like that I never get to a point where I know everything. I always get to learn something new every day and overcome different challenges. I started working with phone systems about 30 years ago and so much has changed since then. I started as a customer, myself, and then transitioned into installing phone systems.

Read More
Topics: Our Company

How to identify Social Engineering

Alyssa Sisco

Social engineering involves the manipulation or deception of people in order to obtain information or access they shouldn't have. Social engineers could be after a password, bank account information, access to your corporation's network or anything else that could benefit them. Their end goal could be to steal money, company secrets, to disrupt your business or to shut it down entirely.

Because social engineering preys on human behavior, it's one of the most dangerous threats to cybersecurity. Can you rely on each staff member at your company to successfully identify and protect against these attacks?

Read More
Topics: Staff Training, Security Threats, Network Security

Windows Server 2008 end of support

Alyssa Sisco

Support for Windows Server 2008 and 2008 R2 is ending on January 14, 2020.

This means that no more security updates will be developed or released after January 14, 2020. Running unsupported software on your server can leave your business vulnerable to any number of cybersecurity attacks and may keep your business from meeting compliance requirements.

Read More
Topics: Microsoft Products, Network Security

Meet the Team: Jim Carraher

Alyssa Sisco

Say hi to Jim Carraher! In the biz for 39 years, there isn't a lot Jim doesn't know about phone systems and their applications. With the title of Business Development Manager, (or self-dubbed "sales guy") Jim certainly isn't your typical salesman. He spends most of his time listening. After he's heard all your concerns, struggles or objectives, he suggests specific applications, integrations or pieces of technology that are capable of providing the solutions you're looking for. But, he's also the first person to come out and tell you that an application or integration is not right for your business and isn't worth investing in. To learn more about Jim, check out the interview!

Read More
Topics: Our Company

Office 365 Migration

Alyssa Sisco

Are you still working off an old in-house or hosted server for your email? If you haven’t already made the move to Office 365, it’s time you do. With the benefits far outweighing the costs, there’s no reason to keep your business in the past with outdated technology. Seriously – once you finally take the leap and make this change, your only regret will be not doing it sooner.

Read More
Topics: Microsoft Products, The Workplace

End of life for Windows 7

Alyssa Sisco

A constant drive to create new features, combined with limited resources, leaves software with an expiration date. Since the goal of most tech companies is to evolve and innovate, they can only lend so much time, money and energy on their old programs. So, software is given what's called an end of life date. On that day, the developer will no longer fix any issues found in the software. Not even Microsoft has the resources to keep software supported forever. So, it's coming time to say goodbye to Windows 7. Windows 7 will no longer receive patches for new bugs or holes discovered as of January 14, 2020.

Read More
Topics: Microsoft Products, Network Security, Alert

Receive a free USB device? It may contain malware.

Alyssa Sisco

When an editor for The Economist (Leo Mirani), received a free mini USB-powered fan at the Singapore summit (where President Trump and North Korean leader Kim Jong-un met) he chose to not plug it in. He didn't know who made this fan, where exactly it came from, or if it had anything on it. However, he did know that any USB device presents the possibility of malware. Whether it's a fan, thumb-drive, mouse, keyboard (or anything else that plugs into your phone or laptop) it could pose a threat to your security. And when all the journalists at a high-stakes meeting - between two countries who have been known to partake in cyber-warfare - are given USB devices, it's best to err on the side of caution. 

Read More
Topics: Staff Training, Security Threats

Meet the Team: Galen Winkler

Alyssa Sisco

Today, get to know Galen! As one of our Systems Admins, Galen is always looking for ways to improve the workflows of his clients by introducing new solutions or applications. He also troubleshoots and repairs equipment when clients encounter issues. If Galen were lucky enough to be given a small fortune, he may not be be frugal enough to spend it all in one place, but he's sure that if he absolutely had to, he could find some things worth the money at a big-box electronic store. For more on Galen, check out the video!

Read More
Topics: Our Company

Are you an easy target for phishing scams?

Alyssa Sisco

The sole objective of any phishing email is to trick you into clicking it. If you aren't vigilant, it can be easy to fall for. It doesn't matter who you are, how much money you have, or what company you work for, you can be targeted and it's important to know how to protect yourself.

Since Amazon and Uber are so well-known and widely-used, cybercriminals have often chosen them to impersonate. Their aim? To lull you into a false sense of security at seeing the familiar brand name. With the addition of a subject line that will illicit a response, anyone could find themselves clicking on a link before even taking a second to think.

Read More
Topics: Staff Training, Security Threats, Network Security