blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Joel Havenridge

Joel Havenridge
As the Systems Engineer’s Team Lead, Joel Havenridge is responsible for the design, implementation, stability, integrity, and efficient operation of information systems that support CoreTech's clients.
Connect with me:

Author's Posts

Maximize Your Computer’s Screen Space with Windows Virtual Desktop

Joel Havenridge
Sometimes, even with multiple monitors, screen real estate is hard to come by. You have many programs open and need many up at the same time, like Outlook, Word, Excel, Teams or Slack, QuickBooks, Business Works, Dynamics, Explorer, Chrome, Firefox and whatever other line of business applications you use throughout the day. Virtual Desktop, a Windows 10 feature, gives you the opportunity to move applications into their own desktop and helps you juggle all those open windows.
Read More
Topics: Microsoft Products

Do I Need a Firewall When Employees Work Remotely?

Joel Havenridge
With more small businesses turning to a remote workforce, protecting business operations and data is crucial. As a business owner, you most likely will need multiple firewalls to provide the necessary security required by remote access. This includes both an on-premise appliance and software that runs on the remote computers your employees use at home.  Evaluating the use and risk of your IT solutions will go a long way in deciding which firewalls you need so you can get the most benefits of ...
Read More
Topics: Equipment Purchases, Network Security

What Are the Benefits of Firewall Security?

Joel Havenridge
For most small business owners today, running a business effectively and efficiently requires connecting to the internet. Your business systems and software likely process millions of information requests and transfers every day, and each one is an opportunity for cyber criminals to find their way into your network. That’s why it’s essential to have a firewall in place.  Simply put, firewalls keep bad things on one side and good things on the other. The benefits of firewall security run the ...
Read More
Topics: Security Threats, Network Security

Are TikTok and WeChat Really Trying to Steal Private Information?

Joel Havenridge
Click to view infographic in new window.
Read More
Topics: Security Threats, Trends

Spotting Spoofed or Phishing Emails on a Mobile Device

Joel Havenridge
You've probably noticed our previous updates covering phishing and how to identify phony emails. And, you've likely had a bit of practice with identifying them yourself on your work computer. But what about staying safe on your mobile device?  The rules for detecting spam and phishing hazards on your phone or tablet differ slightly than what you are used to doing in Outlook on your desktop or laptop. The process isn’t quite as straightforward, but you can still take precautionary steps to avoid ...
Read More
Topics: Security Threats

6 Reasons a Firewall is an Essential Part of Your Business’s Cyber Security

Joel Havenridge
In today’s world, you can never be too careful with your organization’s cyber security. And if your employees are accessing the internet, a firewall needs to be a key part of your cyber security strategy. Firewall tools are not only useful for securing digital assets and protecting hardware, but can also be used to block employees from accessing prohibited sites and to filter web traffic. Certain firewall configurations can even tip you off if a data breach or intrusion occurs, which means you ...
Read More
Topics: Security Threats, Network Security

How much information is on your IoT devices?

Joel Havenridge
You wouldn’t throw your financial paperwork in the trash without shredding it - or at least, you shouldn’t. Because you know that if someone got a hold of that information, they could potentially steal your money. But what about your IoT devices? Are you as careful when disposing of them? How much information is on smart devices you’ve connected in your home? When it comes time to get rid of them, there may be enough information left on them to open your home to someone trying to steal your ...
Read More
Topics: Security Threats, Network Security

The “CoreCare agent”

Joel Havenridge
During the onboarding process or while on a service call, you may have heard us use the term “CoreCare agent” but weren’t quite sure what that is or does. As a contracted client, either CoreCare | Critical or CoreCare | Basic, there is a small application that runs on your computer, whether it’s a PC, laptop, Surface or server, that periodically sends information about the status and health of that computer to our RMM (remote monitoring and management) utility database (aka “the system”). Some ...
Read More

Passwords are like underwear

Joel Havenridge
Almost anything you do online these days requires a password, from logging into your Facebook account to conducting online banking to managing personal and business credit card statements. Passwords are a necessity to keep your online information safe and sound. How should you protect your passwords? You shouldn’t leave them out where people can see them. You should change them regularly Don’t share them with friends. You shouldn’t loan them out!
Read More
Topics: Staff Training

Can I Purchase a Consumer-Class Laptop for My Business? What You Should Know.

Joel Havenridge
Every now and then we have a client that for one reason or another ends up with a consumer class computer. They may be wanting to save money, or needed a computer for a new hire ASAP. So what's wrong with that? If it's an HP computer that should be good enough right? HP, as well as most computer vendors, have two lines: consumer and business class computers. These can be desktops or laptops, so what is the difference?
Read More
Topics: Equipment Purchases