blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Alyssa Sisco

Alyssa Sisco

As a Marketing Coordinator at CoreTech, Alyssa Sisco supports client communication efforts, and is responsible for creation of content assets, enCore newsletter, and marketing collateral.
Connect with me:

Author's Posts

10 Most Commonly Used Brands in Phishing Attacks

Alyssa Sisco

Phishing is a common tactic used by cyber criminals, as it can be very lucrative but doesn’t require as much technical, hacking know-how as other types of cyber attacks. Hackers often bank on you recognizing a brand name and being one-of-many that have an account with that company. With this in mind they convince you that the phishing email is legitimate. Often claiming that you’ve been locked out of your account, a payment didn’t go through, you need to ...

Read More
Topics: Staff Training, Security Threats, Trends

3 steps to a safer inbox

Alyssa Sisco

More than 90% of targeted attacks start with email. If the typical office worker receives an average of 121 emails per day and 1 out of every 101 emails are malicious, chances are that your employees will come face-to-face with emails containing malware or social engineering scams. The top three most common themes of malicious emails are Billing/Invoicing, Package Delivery, and Scanned Documents. Since businesses can’t very well stop communicating via email, ...

Read More

Why your small business should care about malware

Alyssa Sisco

Talking about the dangers associated with a malware infection can feel abstract for those who have never experienced it firsthand. To some, it may seem like a vague concept, not something that really requires you to take action. Most small business owners feel that it’s not going to happen to them and they have more pressing matters to attend to. However, they don’t usually realize that 47% of small businesses experienced at least one cyber attack in 2018 and ...

Read More
Topics: Security Threats, Owners & Managers

Own a business in Omaha and need IT help?

Alyssa Sisco

It’s hard to run a business when you’re constantly being interrupted by computer restarts, unreliable internet connections, or frequently dropped calls. Yet, many small businesses just live with these frustrations because they don’t have the time or resources to find and fix the issue. Or, they simply get stuck in a break/fix loop with old technology or temporary fixes. We get that most small to midsize businesses in Omaha can’t shell out the resources to ...

Read More
Topics: Owners & Managers, The Workplace, Local Omaha News

Why a Business Continuity and Disaster Recovery Plan is a must

Alyssa Sisco

Most often, we deal with disasters like ransomware infections or down servers. But lately, Nebraska residents and businesses are combating severe flooding. Although natural disasters are statistically less likely to destroy your tech equipment than malware, we have recently seen firsthand just how devastating natural disasters can be when they do strike. In fact, this image was taken by CoreTech staff member, Mike, near his home this week.

When ...

Read More
Topics: Owners & Managers, Local Omaha News

Is Unified Communications worth the investment?

Alyssa Sisco

Over 46% of companies are increasing their IT budget to invest in Unified Communications (UC). But, why? If so many businesses are convinced UC is the right place to invest their money, there must be some compelling reasons.

So, let’s take a look at your business. What are your goals for the coming year(s)? Are you looking to improve productivity, efficiency, collaboration, customer service or client retention? Is your business currently growing or ...

Read More
Topics: Equipment Purchases, Trends, Phone Systems

Do external devices have access to your business's internal network?

Alyssa Sisco

Any infected device that is connected to your internal network has the potential to infect all the other devices on that network. Last week, a third-party vendor brought in a device that when connected to CHI Health’s network, introduced malware to their system. The virus spread to different devices at some of their hospitals and clinics and affected browsers attempting to connect with the health system’s network.

Read More
Topics: Security Threats, Network Security

Do you know if your CEO’s email username and password are being sold on the dark web right now?

Alyssa Sisco

Do you know if your CEO’s email username and password are being sold on the dark web right now? How would you? Eventually, you’ll find out when you have to prevent finance from wiring a hacker - posing as your CEO - large sums of money. Or, you may find out after finance has already fallen for a CEO fraud phishing scam and wired a hacker money… But if there is a way for you to know when your CEO’s credentials are being sold in the first place, you ...

Read More
Topics: Security Threats, Data Breach, Network Security

What we can learn about cybersecurity from the government shutdown

Alyssa Sisco

Amid the current government shutdown, over 80 government websites are either down or insecure. With no IT staff around to renew their TLS (Transport Layer Security) certificates, many government websites are being left open to vulnerabilities. Some of the sites are set up so that they become inaccessible to the public if their TLS certificates are not up-to-date. Yet, others simply warn users that the site is not secure, then allows you to bypass the warning ...

Read More
Topics: Owners & Managers, Network Security

What is VoIP? How does it benefit your business?

Alyssa Sisco

Would you be surprised to find out you're already using VoIP? Unless you live on a deserted island, VoIP has already become a part of your daily life--you just may not have realized it!  Since Voice over Internet Protocol (VoIP) phones offer the same functionality as traditional, analog phones, you’re not going to see a difference in the way you make or receive calls. The difference is in the way the information travels. It simply takes analog ...

Read More
Topics: Equipment Purchases, Phone Systems