blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

MFA Fatigue 101: Tactics, Examples, & How to Fight It

Joel Havenridge
Multi-factor authentication (MFA) is becoming mainstream for logging in to personal and business accounts. From your computer, bank account, government websites, or installing apps on your smart TV, MFA provides multiple methods to prove your identity to gain access to the device, statement, website, or app. A major reason for this is that MFA is required for many business cybersecurity insurance policies. MFA is not infallible, but it is part of the multi-layer security model that blocks ...
Read More
Topics: Data Breach, Network Security

Wait, DON’T CLICK that Link!

Camryn Mottl
Phishing attacks continue to be one of the leading cyberattack methods targeting small businesses. With a cyberattack occurring every 36 seconds, hackers are relentlessly trying to steal your company or personal information. One of the ways they collect data is by providing you with a link to click. They are hoping you don’t know the signs and signals that the intent of their request is malicious.
Read More
Topics: Staff Training, Security Threats, Network Security

What is a VPN, and How Does it Work?

CoreTech Staff
Many companies have been working remotely for over a year now—some with no plan to return to the office. As others plan to return to normal, others still are getting the best of both worlds with a hybrid approach. No matter what work model your office adopts, security is still a crucial component of your company’s technology setup. As part of their security efforts, many companies use VPNs for their employees to connect to the office network.
Read More
Topics: The Workplace, Network Security

The Difference Between RaaS, Ransomware 2.0, 3.0, and 4.0

Camryn Mottl
Ransomware has maintained the boogeyman title of cyber security for nearly three decades, growing steadily as its target expanded from individuals to corporations to government facilities and education. Since its creation, hackers have sophisticated ransomware attacks on a database, creating multiple versions to fit whatever objective they try to achieve.
Read More
Topics: Data Breach, Network Security

The Phishing Baits Hackers Use to Reel You In

CoreTech Staff
Read More
Topics: Staff Training, Data Breach, Network Security

2022 Cybersecurity Updates for Small Business

Damon Hagerty
It is no secret that 2021 was full of cyber-related incidents. From the Colonial Pipeline to a cream cheese shortage, cyber attacks hit hundreds of small and midsize businesses (SMBs), sometimes more than once. As a result, SMBs have to take extreme cyber security measures to keep their network safe.
Read More
Topics: Staff Training, Data Breach, Network Security, Disaster Recovery

Exposing a Hackers Popular Tactic: the Brute Force Attack

Camryn Mottl
Hackers continue to refine their intrusion techniques to create more sophisticated attacks. But they still use tried and true methods. One is a brute force attack, a trial-and-error hacking method to crack passwords, login credentials, and encryption keys. They systematically try or steal, different usernames and passwords until they log into the system correctly.
Read More
Topics: Security Threats, Data Breach, Network Security

How Does a Hacker Infiltrate My Business?

Camryn Mottl
When a burglar is trying to break into a house, they case the place for weak spots, such as open windows, unlocked doors, or they might befriend one of the household members to gain entry without suspicion.  
Read More
Topics: Security Threats, Data Breach, Network Security

6 Motivations of Cyber Criminals

Camryn Mottl
If you’ve read about recent cyber attacks in the news, you might be wondering why cyber criminals try to hack into other systems and what motivates them.   If you can understand why a hacker hacks (their motivations) a little more clearly, along with who is most likely to be targeting your specific organization, you can bolster your defenses and be ready for whatever the threat landscape throws your way.
Read More
Topics: Security Threats, Network Security

Are Your Employees an Insider Risk?

Camryn Mottl
While most cyber security measures are put in place to focus on threats outside of an organization, there may be some untrustworthy or negligent individuals who are increasing chances of a cyber-attack within your company. Let’s discuss how you can reduce potential threats to your business and provide solutions to prevent future exposures.
Read More
Topics: Security Threats, Owners & Managers, Network Security