blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Understanding New Policy Changes Shaping IT Security

Chris Vilim
Cybercrime has become one of the greatest threats to modern businesses. As the prevalence of malicious cyber activity continues to increase, so does its toll on companies. In fact, it is estimated that cybercrime will cost the world $6 trillion annually by 2021. Regulatory and governing entities are starting to take notice as they begin to enact new rules and regulations to keep this type of crime at bay. With these new policy changes in place, it is possible that your organization may be ...
Read More
Topics: Network Security, Law

Protecting Your Business Using Managed IT Security Services

Chris Vilim
Nearly 70 percent of small businesses have experienced some form of cyber attack, and nearly 60 percent have experienced a data breach in the last year. While these statistics are certainly alarming, what’s more alarming is that about half of small businesses have little to no understanding of how to protect their companies against cyber security threats.  That’s where managed IT security services come in. A robust and effective IT security strategy requires numerous tools, and most small to ...
Read More
Topics: Security Threats, Network Security

Mobile Device Management Is the Solution You Need for Mobile Workers

Wynn Obermeyer
In just the past few years, the way employees use mobile devices in the workplace has significantly shifted. The popularity of remote work options and the adoption of bring your own device (BYOD) programs have increased. Whether employees are using their own mobile device or a company-owned device, they can enjoy the flexibility and ease of working remotely, while employers benefit from increased productivity and efficiency. However, as more companies embrace employee mobility, they also need ...
Read More
Topics: Trends, Network Security

What Should I Do If My System Is Hacked?

Wynn Obermeyer
There’s no question about it — getting hacked is every business owner’s nightmare. And when one employee’s computer is compromised, it can impact your entire network, infecting computers and devices across your organization, bringing your business to a screeching halt. The good news is that there are steps you can take immediately after you’re hacked to limit the damage to your business network.
Read More
Topics: Staff Training, Security Threats, Data Breach, Network Security

Improve Password Security with These Easy Solutions

Chris Vilim
Most business owners and managers understand the important role that secure passwords play in protecting business data and accounts from being compromised. When you consider that business technology users maintain an average of 191 passwords, it only makes sense that not every organization wants to take on the considerable feat of ensuring their staff create unique and complex passwords for every application and account they have access to. Nevermind regularly updating all those passwords every ...
Read More
Topics: Staff Training, The Workplace, Network Security

Managed Service Providers and Health Care: Keeping Your Organization Secure

Tom Montgomery
Cyber criminals often target organizations in the health care industry due to the type of data they access. Whether your organization is large or small, you are at risk for these attacks. Most modern cyber attack targeting is done by bots, using AI to scan for soft targets — they don’t care about the size of their victim. If you’re simply following governmental regulations regarding electronic health records, you’re most likely not doing enough to protect yourself from new threats as they ...
Read More
Topics: Network Security, Health Care

What's Giving Business Owners Nightmares this October? Cyber Security Threats

Alyssa Sisco
October is Cyber Security Awareness Month! At CoreTech, we take cyber security seriously, so we talk about it A LOT. Our goal is for everyone we encounter to not only be aware of the magnitude of the cyber security threat landscape, but also that they have the tools and plans in place to prevent cyber attacks and security breaches. We have a lot of resources available on our website and realize the magnitude of cyber security can quickly become overwhelming. So, we wanted to take you on a ...
Read More
Topics: Staff Training, Security Threats, Data Breach, Owners & Managers, Network Security

IT for Law Firms: How Managed Service Providers Help Legal Clients

Tom Montgomery
In the legal industry, time is money. And there’s nothing more frustrating than sitting down to a full day of billable work when your technology starts to fail you. If you don’t have an in-house IT team, this often results in spending hours trying to fix the problem yourself before you finally call in an expert who might be able to fit you in at some point, after they figure out how your system is structured.
Read More
Topics: Network Security, Law

What Is a Business Continuity Plan and Why Is It Important?

Chris Vilim
A business continuity and disaster recovery plan — also called an IT service continuity plan — is a company document that outlines what should be done in the event of a “disaster”. This includes everything from natural disasters, like floods and fires, to server outages or security breaches and more. Every business’s continuity plan looks different, but most start with the following components:
Read More
Topics: Data Breach, Owners & Managers, Network Security

A New First Line of Defense: Umbrella DNS Filtering

Alyssa Sisco
When thinking about cyber security threats, does it ever concern you how many threats are sitting out there, just on the other side of your firewall? What if we told you that your business could expand that cyber security shield further out — away from your internal network? The more space placed between your data and bad actors, and the more chances your security applications have to spot and stop malicious code before it acts, the better. That’s why we’re excited to offer Cisco Umbrella DNS ...
Read More
Topics: Cloud, Trends, Network Security