blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

The 7 Best and Worst Personalities in Every Business Meeting [+Free Infographic]

Kaitlin Schneider
Whether your meetings take place in person or on a video conferencing platform, there are a few personality types that make themselves known in every meeting.     Do you know which ones are the best – or the worst – for successful meetings in your organization?  
Read More
Topics: The Workplace

Latest Microsoft 365 Updates Boost Collaboration and Simplify Your Work Life

Waheed Bhatti
From increasing the grid view size on Teams to increased security features, Microsoft is rolling out an array of updates for users that will simplify both work and personal life. Read on to hear about the biggest changes coming to your favorite Microsoft 365 business applications.
Read More
Topics: Microsoft Products

3 Most Common Business Network Security Threats

Wynn Obermeyer
As more companies, large and small, increasingly rely on technology and cloud computing to keep their operations running, network security demands more attention.  Small businesses in particular often don’t realize they are at risk, but external IT security threats are always present. Therefore, it’s imperative to recognize and prepare for these potential security threats to protect your clients, your employees and your business.
Read More
Topics: Security Threats

3 Criteria You Should Consider When Selecting An IT Service Provider

Kaitlin Schneider
When choosing a managed service provider (MSP), it can be difficult to know exactly what to look for regarding experience, terms and services. By hiring any service provider, you’re taking a big risk with your security, efficiency, and assets, so identifying the right one is key. When you’re investigating potential candidates, however, there are many different factors to consider. You need to understand what they offer in terms of support, what services are included in your contract and how ...
Read More
Topics: Technology Planning

How to Avoid Falling Victim to Cryptocurrency Scams

Kaitlin Schneider
On July 15, a small group of hackers gained access to 130 high-profile Twitter accounts, and they perpetuated a cryptocurrency scam via the social media platform. The group made off with 12.9 Bitcoin, which, as of the exchange rate at that time, equates to around $120,000.  
Read More
Topics: Security Threats, Data Breach, Trends

4+ Tips to Securely Work from Home

Damon Hagerty
Since the COVID-19 virus arrived in our country, we’ve had to rethink our safety, but at the same time continue our professional lives.  Working from home became the “new normal”, and we’ve had to introduce ourselves to new technology to ensure our work habits are as similar and productive as they were at the job site.  Most larger organizations had remote desktop services and could provide technologies that smaller companies couldn’t compete with - until now.   
Read More
Topics: Security Threats, Network Security

7 Pros and Cons of Working from Home Long-Term

Kaitlin Schneider
You’ve no doubt noticed that working from home has several advantages, but, as with anything, there are also a few downsides as well. During the current pandemic, both sides of the equation have likely surfaced at one point or another.   Depending on your work style and your actual job responsibilities, you may love working from home or hate it, so we’ve detailed seven pros and seven cons of working from your home office, dining room or—let’s admit it—your couch.  
Read More
Topics: The Workplace, Trends

The Benefits and Risks of Cloud Computing

Chris Vilim
With ever-changing technology and data, storing and maintaining information continues to present challenges for every business owner. This is especially true for businesses that operate on a mobile or remote basis, with employees in the field who are frequently needing to access and update data to collaborate with other team members. Cloud computing provides several advantages to a business environment, but it’s imperative to evaluate both the benefits and the risks involved to determine if the ...
Read More
Topics: Cloud

CoreTech Celebrates Our 20th Anniversary

Kaitlin Schneider
Twenty years ago, on July 17, 2000, CoreTech president Chris Vilim and his father, Larry, joined forces to deliver quality IT services to Omaha’s small businesses. 
Read More
Topics: Our Company

3 Solutions to Minimize Cyber Security Threats for Remote Workers

Wynn Obermeyer
Do you know if your remote workers are as secure as they can be?
Read More
Topics: Security Threats, Network Security