blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

CoreTech Staff

CoreTech Staff
Connect with me:

Author's Posts

Aligning Cyber Security with your Business Strategy

CoreTech Staff
Since digital transformation has taken the business world by storm, many business owners remain uncertain on how to integrate cyber security with their business strategy and daily workflows. First, it’s important for business owners to understand that security is not simply a process performed in the background, but when it's ingrained with business processes, it enables your business to thrive. So, how do you get cyber security and business strategy to align and work cohesively?
Read More
Topics: Owners & Managers, Network Security

10 Most Commonly Used Brands in Phishing Attacks

CoreTech Staff
Phishing is a common tactic used by cyber criminals, as it can be very lucrative but doesn’t require as much technical, hacking know-how as other types of cyber attacks. Hackers often bank on you recognizing a brand name and being one-of-many that have an account with that company. With this in mind they convince you that the phishing email is legitimate. Often claiming that you’ve been locked out of your account, a payment didn’t go through, you need to update your information, or anything ...
Read More
Topics: Staff Training, Security Threats, Trends

Why a Business Continuity and Disaster Recovery Plan is a must

CoreTech Staff
Most often, we deal with disasters like ransomware infections or down servers. But lately, Nebraska residents and businesses are combating severe flooding. Although natural disasters are statistically less likely to destroy your tech equipment than malware, we have recently seen firsthand just how devastating natural disasters can be when they do strike. In fact, this image was taken by CoreTech staff member, Mike, near his home this week. When catastrophes like flooding occur, we become ...
Read More
Topics: Owners & Managers, Local Omaha News

Is Unified Communications worth the investment?

CoreTech Staff
Over 46% of companies are increasing their IT budget to invest in Unified Communications (UC). But, why? If so many businesses are convinced UC is the right place to invest their money, there must be some compelling reasons. So, let’s take a look at your business. What are your goals for the coming year(s)? Are you looking to improve productivity, efficiency, collaboration, customer service or client retention? Is your business currently growing or adding options for remote work? If this sounds ...
Read More
Topics: Equipment Purchases, Trends, Phone Systems

Do External Devices Have Access to Your Business's Internal Network?

CoreTech Staff
Any infected device that is connected to your internal network has the potential to infect all the other devices on that network. Last week, a third-party vendor brought in a device that when connected to CHI Health’s network, introduced malware to their system. The virus spread to different devices at some of their hospitals and clinics and affected browsers attempting to connect with the health system’s network.
Read More
Topics: Security Threats, Network Security

What we can learn about cybersecurity from the government shutdown

CoreTech Staff
Amid the current government shutdown, over 80 government websites are either down or insecure. With no IT staff around to renew their TLS (Transport Layer Security) certificates, many government websites are being left open to vulnerabilities. Some of the sites are set up so that they become inaccessible to the public if their TLS certificates are not up-to-date. Yet, others simply warn users that the site is not secure, then allows you to bypass the warning and continue onto the site. Once on ...
Read More
Topics: Owners & Managers, Network Security

What is VoIP? How does it benefit your business?

CoreTech Staff
Would you be surprised to find out you're already using VoIP? Unless you live on a deserted island, VoIP has already become a part of your daily life--you just may not have realized it! Since Voice over Internet Protocol (VoIP) phones offer the same functionality as traditional, analog phones, you’re not going to see a difference in the way you make or receive calls. The difference is in the way the information travels. It simply takes analog audio signals and transmits them over the internet ...
Read More
Topics: Equipment Purchases, Phone Systems

10 Tips for Tightening the Financial Controls of Your Business

CoreTech Staff
Recently, it has come to light that Save the Children Federation was swindled into wiring $1 million to cybercriminals. The money was allegedly going to buy solar panels for health centers in Pakistan, which is well within the scope of the organization’s standard operations. Unfortunately, the transaction was not uncovered as fraudulent until a month after it occurred, thus they were unable to stop the cybercriminals from making off with the funds.
Read More
Topics: Staff Training, Security Threats, Owners & Managers

Monitor Internal Threats with Cyber Hawk

CoreTech Staff
Let’s say you eat healthy, exercise, drink water, get eight hours of sleep every night, take vitamins and get your flu shot. Can you be 100% certain that you’re not going to get the flu this year? No. But each step you take towards being healthy, strengthens your immune system and lowers your risk of getting sick. In IT, we call this a layered approach. There is no one tool you can use to guarantee your business’s safety from a cyber-attack, but you can take multiple tools and put them together ...
Read More
Topics: Network Security

The risks of unpatched applications and unsupported equipment

CoreTech Staff
Everyday more technology processes are automated, saving us from performing tedious tasks over and over. However, the technology that helps us and makes our lives easier is also used by hackers and cybercriminals to take advantage of us. Hackers use automation to build bots that continuously search the internet for unpatched and vulnerable devices to infect. In fact, almost 30% of all internet traffic is made up of bad bots such as hacking tools, impersonators, scrapers and spammers. Once a ...
Read More
Topics: Security Threats, Data Breach, Equipment Purchases, Network Security