blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

What Should I Do If My System Is Hacked?

Wynn Obermeyer
There’s no question about it — getting hacked is every business owner’s nightmare. And when one employee’s computer is compromised, it can impact your entire network, infecting computers and devices across your organization, bringing your business to a screeching halt. The good news is that there are steps you can take immediately after you’re hacked to limit the damage to your business network.
Read More
Topics: Staff Training, Security Threats, Data Breach, Network Security

Improve Password Security with These Easy Solutions

Chris Vilim
Most business owners and managers understand the important role that secure passwords play in protecting business data and accounts from being compromised. When you consider that business technology users maintain an average of 191 passwords, it only makes sense that not every organization wants to take on the considerable feat of ensuring their staff create unique and complex passwords for every application and account they have access to. Nevermind regularly updating all those passwords every ...
Read More
Topics: Staff Training, The Workplace, Network Security

Managed Service Providers and Health Care: Keeping Your Organization Secure

Tom Montgomery
Cyber criminals often target organizations in the health care industry due to the type of data they access. Whether your organization is large or small, you are at risk for these attacks. Most modern cyber attack targeting is done by bots, using AI to scan for soft targets — they don’t care about the size of their victim. If you’re simply following governmental regulations regarding electronic health records, you’re most likely not doing enough to protect yourself from new threats as they ...
Read More
Topics: Network Security, Health Care

What's Giving Business Owners Nightmares this October? Cyber Security Threats

Alyssa Sisco
October is Cyber Security Awareness Month! At CoreTech, we take cyber security seriously, so we talk about it A LOT. Our goal is for everyone we encounter to not only be aware of the magnitude of the cyber security threat landscape, but also that they have the tools and plans in place to prevent cyber attacks and security breaches. We have a lot of resources available on our website and realize the magnitude of cyber security can quickly become overwhelming. So, we wanted to take you on a ...
Read More
Topics: Staff Training, Security Threats, Data Breach, Owners & Managers, Network Security

IT for Law Firms: How Managed Service Providers Help Legal Clients

Tom Montgomery
In the legal industry, time is money. And there’s nothing more frustrating than sitting down to a full day of billable work when your technology starts to fail you. If you don’t have an in-house IT team, this often results in spending hours trying to fix the problem yourself before you finally call in an expert who might be able to fit you in at some point, after they figure out how your system is structured.
Read More
Topics: Network Security, Law

What Is a Business Continuity Plan and Why Is It Important?

Chris Vilim
A business continuity and disaster recovery plan — also called an IT service continuity plan — is a company document that outlines what should be done in the event of a “disaster”. This includes everything from natural disasters, like floods and fires, to server outages or security breaches and more. Every business’s continuity plan looks different, but most start with the following components:
Read More
Topics: Data Breach, Owners & Managers, Network Security

A New First Line of Defense: Umbrella DNS Filtering

Alyssa Sisco
When thinking about cyber security threats, does it ever concern you how many threats are sitting out there, just on the other side of your firewall? What if we told you that your business could expand that cyber security shield further out — away from your internal network? The more space placed between your data and bad actors, and the more chances your security applications have to spot and stop malicious code before it acts, the better. That’s why we’re excited to offer Cisco Umbrella DNS ...
Read More
Topics: Cloud, Trends, Network Security

The Importance of Mobile Device Security

Alyssa Sisco
One of your sales reps just made it back to the office after a morning jam-packed with meetings. While speaking with his manager about all the conversations he had with current and potential clients, he realizes that he has no idea where his tablet went…. He knows he had it at stops one and two, but after that, he can’t recall if he used his tablet or his smartphone. Now, beyond the monetary expense of the tablet itself and the time spent configuring the proper applications, the most concerning ...
Read More
Topics: Data Breach, Trends, Network Security

6 Reasons a Firewall is an Essential Part of Your Business’s Cyber Security

Joel Havenridge
In today’s world, you can never be too careful with your organization’s cyber security. And if your employees are accessing the internet, a firewall needs to be a key part of your cyber security strategy. Firewall tools are not only useful for securing digital assets and protecting hardware, but can also be used to block employees from accessing prohibited sites and to filter web traffic. Certain firewall configurations can even tip you off if a data breach or intrusion occurs, which means you ...
Read More
Topics: Security Threats, Network Security

Aligning Cyber Security with your Business Strategy

Alyssa Sisco
Since digital transformation has taken the business world by storm, many business owners remain uncertain on how to integrate cyber security with their business strategy and daily workflows. First, it’s important for business owners to understand that security is not simply a process performed in the background, but when it's ingrained with business processes, it enables your business to thrive. So, how do you get cyber security and business strategy to align and work cohesively?
Read More
Topics: Owners & Managers, Network Security