blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

What Should I Do If My System Is Hacked?

Wynn Obermeyer
There’s no question about it — getting hacked is every business owner’s nightmare. And when one employee’s computer is compromised, it can impact your entire network, infecting computers and devices across your organization, bringing your business to a screeching halt. The good news is that there are steps you can take immediately after you’re hacked to limit the damage to your business network.
Read More
Topics: Staff Training, Security Threats, Data Breach, Network Security

What's Giving Business Owners Nightmares this October? Cyber Security Threats

Alyssa Sisco
October is Cyber Security Awareness Month! At CoreTech, we take cyber security seriously, so we talk about it A LOT. Our goal is for everyone we encounter to not only be aware of the magnitude of the cyber security threat landscape, but also that they have the tools and plans in place to prevent cyber attacks and security breaches. We have a lot of resources available on our website and realize the magnitude of cyber security can quickly become overwhelming. So, we wanted to take you on a ...
Read More
Topics: Staff Training, Security Threats, Data Breach, Owners & Managers, Network Security

What Is a Business Continuity Plan and Why Is It Important?

Chris Vilim
A business continuity and disaster recovery plan — also called an IT service continuity plan — is a company document that outlines what should be done in the event of a “disaster”. This includes everything from natural disasters, like floods and fires, to server outages or security breaches and more. Every business’s continuity plan looks different, but most start with the following components:
Read More
Topics: Data Breach, Owners & Managers, Network Security

The Importance of Mobile Device Security

Alyssa Sisco
One of your sales reps just made it back to the office after a morning jam-packed with meetings. While speaking with his manager about all the conversations he had with current and potential clients, he realizes that he has no idea where his tablet went…. He knows he had it at stops one and two, but after that, he can’t recall if he used his tablet or his smartphone. Now, beyond the monetary expense of the tablet itself and the time spent configuring the proper applications, the most concerning ...
Read More
Topics: Data Breach, Trends, Network Security

Do you know if your CEO’s email username and password are being sold on the dark web right now?

Alyssa Sisco
Do you know if your CEO’s email username and password are being sold on the dark web right now? How would you? Eventually, you’ll find out when you have to prevent finance from wiring a hacker - posing as your CEO - large sums of money. Or, you may find out after finance has already fallen for a CEO fraud phishing scam and wired a hacker money… But if there is a way for you to know when your CEO’s credentials are being sold in the first place, you can stop the scam before it even starts. Well, ...
Read More
Topics: Security Threats, Data Breach, Network Security

The risks of unpatched applications and unsupported equipment

Alyssa Sisco
Everyday more technology processes are automated, saving us from performing tedious tasks over and over. However, the technology that helps us and makes our lives easier is also used by hackers and cybercriminals to take advantage of us. Hackers use automation to build bots that continuously search the internet for unpatched and vulnerable devices to infect. In fact, almost 30% of all internet traffic is made up of bad bots such as hacking tools, impersonators, scrapers and spammers. Once a ...
Read More
Topics: Security Threats, Data Breach, Equipment Purchases, Network Security

What can a computer hack really cost you?

Alyssa Sisco
Being the target of a cybercriminal is not a fun experience for anyone, but it’s definitely a lot worse if you don’t have a plan to get back on your feet afterwards. Cybercriminals have caught on to the fact that small and midsize businesses don’t spend as much money on IT security, making them easier targets than large, multimillion-dollar companies. It’s important to note that 62% off all cyber-attacks are carried out on SMBs, according to IBM. Additionally, the National Cyber Security ...
Read More
Topics: Security Threats, Data Breach, Network Security

Why data backup is essential for your business

Alyssa Sisco
If you were to sell your company tomorrow, what exactly would you pass on to a buyer? More than just a company name on a building; You have records, contracts, contacts, financial data and more that go into making your business unique and valuable. It takes an incredible amount of time to acquire, develop and build that network of information. If disaster struck and your computer crashed, how long would it take you to get all that information back? Your data is one thing you should never gamble ...
Read More
Topics: Data Breach, Owners & Managers, The Workplace, Network Security

Destroying your electronic media

Brooke Nielsen
The risks of not properly destroying electronic media, such as computer hard drives, video and audio tapes, etc. can include identity theft, possible HIPAA violations, loss of business reputation and client trust,  and more. Without destruction of these items that are filled with personal and company data, information could be sent to unintended recipients. Individuals, as well as businesses, have confidential information which they don’t want ending up in the wrong hands. Destroying electronic ...
Read More
Topics: Security Threats, Data Breach

HIPAA compliance is serious business

Frank
The government rules and regulations shaped by the Health Insurance Portability and Accountability Act (HIPAA) are continuing to evolve, which can make compliance difficult to measure. Agencies in charge of compliance oversight and enforcement have ramped up enforcement over time knowing it was going to take a lot of time, both to develop the rules and regulations, and to circulate them throughout the health care industry. We have now reached the point where compliance expectations are high and ...
Read More
Topics: Data Breach, Health Care