blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

What Should I Do If My System Is Hacked?

Wynn Obermeyer
There’s no question about it — getting hacked is every business owner’s nightmare. And when one employee’s computer is compromised, it can impact your entire network, infecting computers and devices across your organization, bringing your business to a screeching halt. The good news is that there are steps you can take immediately after you’re hacked to limit the damage to your business network.
Read More
Topics: Staff Training, Security Threats, Data Breach, Network Security

6 Tips for Safely Shopping Online for the Holidays

Alyssa Sisco
As we make our way into the holiday season and start thinking about what we're buying everyone, it’s important to heighten our awareness of who we’re giving our credit card information to. Don’t let cyber criminals ruin your holiday celebrations! Take a minute to remind yourself, your friends, and your family how to keep personal information safe while online shopping for holiday gifts.
Read More
Topics: Security Threats, Trends

What's Giving Business Owners Nightmares this October? Cyber Security Threats

Alyssa Sisco
October is Cyber Security Awareness Month! At CoreTech, we take cyber security seriously, so we talk about it A LOT. Our goal is for everyone we encounter to not only be aware of the magnitude of the cyber security threat landscape, but also that they have the tools and plans in place to prevent cyber attacks and security breaches. We have a lot of resources available on our website and realize the magnitude of cyber security can quickly become overwhelming. So, we wanted to take you on a ...
Read More
Topics: Staff Training, Security Threats, Data Breach, Owners & Managers, Network Security

5 Steps for Getting Your Employees Invested in Your Business's Cyber Security Initiative

Alyssa Sisco
If your employees are required to use a computer, tablet, or smartphone in order to do any aspect of their job, they absolutely need cyber security awareness training. The threat of a cyber security attack or data breach is now simply a cost of doing business in today’s world. It's no longer a question of if, now it's when will your business experience some form of cyber security attack? So, instead of leaving one of your most valuable cyber security assets defenseless in the face of phishing ...
Read More
Topics: Staff Training, Security Threats

How to Prevent a Ransomware Attack on Your Mobile Phone

Alyssa Sisco
Although it’s not as common as ransomware on computers, mobile phone-based ransomware is out there. A recently developed strain of SMS ransomware spreads the instant it’s clicked. It gets onto the victim’s phone, finds any and all contacts and sends all of them a personalized text message, telling them there are compromising pictures of them on an application and providing them with a link. If the recipient of the text clicks the link, not only are all their contacts now sent the same message, ...
Read More
Topics: Staff Training, Security Threats

6 Reasons a Firewall is an Essential Part of Your Business’s Cyber Security

Joel Havenridge
In today’s world, you can never be too careful with your organization’s cyber security. And if your employees are accessing the internet, a firewall needs to be a key part of your cyber security strategy. Firewall tools are not only useful for securing digital assets and protecting hardware, but can also be used to block employees from accessing prohibited sites and to filter web traffic. Certain firewall configurations can even tip you off if a data breach or intrusion occurs, which means you ...
Read More
Topics: Security Threats, Network Security

What is Malware-as-a-Service and what can your business do to ramp up security?

Alyssa Sisco
The structure of the cyber crime industry often parallels that of legitimate tech businesses, more than one would think. As cloud computing has become relatively commonplace for businesses of all sizes and industries, you may have encountered terms like Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). As these advancements occur on the legitimate side of the tech industry, cyber criminals don’t want to be left in the dust. So, how are they ...
Read More
Topics: Security Threats, Alert

10 Most Commonly Used Brands in Phishing Attacks

Alyssa Sisco
Phishing is a common tactic used by cyber criminals, as it can be very lucrative but doesn’t require as much technical, hacking know-how as other types of cyber attacks. Hackers often bank on you recognizing a brand name and being one-of-many that have an account with that company. With this in mind they convince you that the phishing email is legitimate. Often claiming that you’ve been locked out of your account, a payment didn’t go through, you need to update your information, or anything ...
Read More
Topics: Staff Training, Security Threats, Trends

Antivirus vs. Firewall: Why Your Business Needs Both

Tom Montgomery
We have so much information at our fingertips, providing endless opportunities, but with that good, comes a continuous stream of cyber threats. Considering the pervasive presence of cyber criminals today, you need a line of security that’s as tough as anything they can throw at you. You probably already know about the need for antivirus software — but is it strong enough to stand on its own? What about reducing the viruses and malware that make their way onto your computers and network in the ...
Read More
Topics: Security Threats

How much information is on your IoT devices?

Joel Havenridge
You wouldn’t throw your financial paperwork in the trash without shredding it - or at least, you shouldn’t. Because you know that if someone got a hold of that information, they could potentially steal your money. But what about your IoT devices? Are you as careful when disposing of them? How much information is on smart devices you’ve connected in your home? When it comes time to get rid of them, there may be enough information left on them to open your home to someone trying to steal your ...
Read More
Topics: Security Threats, Network Security