blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Alyssa Sisco

Alyssa Sisco

As a Marketing Coordinator at CoreTech, Alyssa Sisco supports client communication efforts, and is responsible for creation of content assets, enCore newsletter, and spreading the word about CoreTech's services.
Connect with me:

Author's Posts

A New First Line of Defense: Umbrella DNS Filtering

Alyssa Sisco
When thinking about cyber security threats, does it ever concern you how many threats are sitting out there, just on the other side of your firewall? What if we told you that your business could expand that cyber security shield further out — away from your internal network? The more space placed between your data and bad actors, and the more chances your security applications have to spot and stop malicious code before it acts, the better. That’s why we’re excited to offer Cisco Umbrella DNS ...
Read More
Topics: Cloud, Trends, Network Security

5 Steps for Getting Your Employees Invested in Your Business's Cyber Security Initiative

Alyssa Sisco
If your employees are required to use a computer, tablet, or smartphone in order to do any aspect of their job, they absolutely need cyber security awareness training. The threat of a cyber security attack or data breach is now simply a cost of doing business in today’s world. It's no longer a question of if, now it's when will your business experience some form of cyber security attack? So, instead of leaving one of your most valuable cyber security assets defenseless in the face of phishing ...
Read More
Topics: Staff Training, Security Threats

How to Prevent a Ransomware Attack on Your Mobile Phone

Alyssa Sisco
Although it’s not as common as ransomware on computers, mobile phone-based ransomware is out there. A recently developed strain of SMS ransomware spreads the instant it’s clicked. It gets onto the victim’s phone, finds any and all contacts and sends all of them a personalized text message, telling them there are compromising pictures of them on an application and providing them with a link. If the recipient of the text clicks the link, not only are all their contacts now sent the same message, ...
Read More
Topics: Staff Training, Security Threats

The Importance of Mobile Device Security

Alyssa Sisco
One of your sales reps just made it back to the office after a morning jam-packed with meetings. While speaking with his manager about all the conversations he had with current and potential clients, he realizes that he has no idea where his tablet went…. He knows he had it at stops one and two, but after that, he can’t recall if he used his tablet or his smartphone. Now, beyond the monetary expense of the tablet itself and the time spent configuring the proper applications, the most concerning ...
Read More
Topics: Data Breach, Trends, Network Security

5 ways Office 365 makes collaboration easy

Alyssa Sisco
Gone are the days where you needed to email revised copy after revised copy, only to be told, “Wait, I have one more change.” Whether you're in the same building, or across the globe, Office 365 makes it easy to work seamlessly with others. Office 365 is the subscription-based version of the Office suite and it receives new features and updates as they become available. With Office 365, you can be productive from anywhere, on any device. But more than just being able to work on documents, ...
Read More
Topics: Cloud, Microsoft Products, The Workplace

What is Malware-as-a-Service and what can your business do to ramp up security?

Alyssa Sisco
The structure of the cyber crime industry often parallels that of legitimate tech businesses, more than one would think. As cloud computing has become relatively commonplace for businesses of all sizes and industries, you may have encountered terms like Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). As these advancements occur on the legitimate side of the tech industry, cyber criminals don’t want to be left in the dust. So, how are they ...
Read More
Topics: Security Threats, Alert

Microsoft’s push for Businesses to upgrade from Skype for Business to Microsoft Teams

Alyssa Sisco
No official End-of-Life date has been announced for Skype for Business thus far, but that doesn’t mean it’s not being phased out. Microsoft is confident that Microsoft Teams will be able to meet the messaging, meeting, and calling needs of businesses with 500 users or less. So, as of November 2018, if Microsoft believes a Skype for Business user would be better served by Microsoft Teams, they will push them to upgrade from Skype to Teams. New organizations looking for a Microsoft communication ...
Read More
Topics: Microsoft Products, Trends

Aligning Cyber Security with your Business Strategy

Alyssa Sisco
Since digital transformation has taken the business world by storm, many business owners remain uncertain on how to integrate cyber security with their business strategy and daily workflows. First, it’s important for business owners to understand that security is not simply a process performed in the background, but when it's ingrained with business processes, it enables your business to thrive. So, how do you get cyber security and business strategy to align and work cohesively?
Read More
Topics: Owners & Managers, Network Security

10 Most Commonly Used Brands in Phishing Attacks

Alyssa Sisco
Phishing is a common tactic used by cyber criminals, as it can be very lucrative but doesn’t require as much technical, hacking know-how as other types of cyber attacks. Hackers often bank on you recognizing a brand name and being one-of-many that have an account with that company. With this in mind they convince you that the phishing email is legitimate. Often claiming that you’ve been locked out of your account, a payment didn’t go through, you need to update your information, or anything ...
Read More
Topics: Staff Training, Security Threats, Trends

3 steps to a safer inbox

Alyssa Sisco
More than 90% of targeted attacks start with email. If the typical office worker receives an average of 121 emails per day and 1 out of every 101 emails are malicious, chances are that your employees will come face-to-face with emails containing malware or social engineering scams. The top three most common themes of malicious emails are Billing/Invoicing, Package Delivery, and Scanned Documents. Since businesses can’t very well stop communicating via email, they need to take precautions to ...
Read More