blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

7 Tax Season Cyber Threats and How You Can Stay Safe

Kaitlin Schneider
Tax season 2020 is well underway, and that means cyber scammers are out in full force, making more and more attempts to access personal information and accounts. Cyber threats are intense year-round, but the threats ramp up in the February-April time period. Nobody wants to add another item to their list of things to get done during tax season, but now, more than ever, is the time to stay safe and secure. To make sure that you’re aware of the many virtual dangers that surface regularly during ...
Read More
Topics: Security Threats, Trends, Finance

Juice Jacking: The Latest Tactic in a Hacker's Cyber Theft Arsenal

Kaitlin Schneider
Picture this: you’re at the airport, having just passed through a long-winding security line. You’re about to take your seat when you check the time on your phone, but then you notice that your battery has 3% remaining. Panic grips you immediately; you still have a 45-minute wait before you can board the plane. And your boarding pass is only accessible through your phone! You think, “Wait a second; I saw a USB charging station a few minutes ago.” You breathe a sigh of relief as you realize that ...
Read More
Topics: Security Threats, Trends

Still Using the Same Antivirus You were 5 Years Ago?

Bill Weber
As technology advances, so too do cyber threats. Without proper antivirus (AV) software that can adequately prevent those ever-changing dangers, your device is at risk of being infected with viruses, worms or malware, and, traditionally, that malware has been file-based. Previous generations of AV would have sufficed against that particular threat. However, the name of the game is money—hackers no longer only use file-based malware, as their potential return on those attacks is significantly ...
Read More
Topics: Security Threats, Network Security

Spotting Spoofed or Phishing Emails on a Mobile Device

Joel Havenridge
You've probably noticed our previous updates covering phishing and how to identify phony emails. And, you've likely had a bit of practice with identifying them yourself on your work computer. But what about staying safe on your mobile device?  The rules for detecting spam and phishing hazards on your phone or tablet differ slightly than what you are used to doing in Outlook on your desktop or laptop. The process isn’t quite as straightforward, but you can still take precautionary steps to avoid ...
Read More
Topics: Security Threats

Protecting Your Business Using Managed IT Security Services

Chris Vilim
Nearly 70 percent of small businesses have experienced some form of cyber attack, and nearly 60 percent have experienced a data breach in the last year. While these statistics are certainly alarming, what’s more alarming is that about half of small businesses have little to no understanding of how to protect their companies against cyber security threats.  That’s where managed IT security services come in. A robust and effective IT security strategy requires numerous tools, and most small to ...
Read More
Topics: Security Threats, Network Security

Is That Email Really From UPS? Or is it a Phishing Email?

Alyssa Sisco
‘Tis the season for online shopping. As the volume of online sales increases, so do the frequency of phishing emails disguised as popular online retailers and delivery services. It’s important to remember that a cyber criminal’s goal is to get you to click before you consider the possibility that the email you’ve received could be fraudulent. This is why it’s important to take the time to really look at emails before clicking any links or downloading attachments — especially if an email is ...
Read More
Topics: Staff Training, Security Threats

What Should I Do If My System Is Hacked?

Wynn Obermeyer
There’s no question about it — getting hacked is every business owner’s nightmare. And when one employee’s computer is compromised, it can impact your entire network, infecting computers and devices across your organization, bringing your business to a screeching halt. The good news is that there are steps you can take immediately after you’re hacked to limit the damage to your business network.
Read More
Topics: Staff Training, Security Threats, Data Breach, Network Security

6 Tips for Safely Shopping Online for the Holidays

Alyssa Sisco
As we make our way into the holiday season and start thinking about what we're buying everyone, it’s important to heighten our awareness of who we’re giving our credit card information to. Don’t let cyber criminals ruin your holiday celebrations! Take a minute to remind yourself, your friends, and your family how to keep personal information safe while online shopping for holiday gifts.
Read More
Topics: Security Threats, Trends

What's Giving Business Owners Nightmares this October? Cyber Security Threats

Alyssa Sisco
October is Cyber Security Awareness Month! At CoreTech, we take cyber security seriously, so we talk about it A LOT. Our goal is for everyone we encounter to not only be aware of the magnitude of the cyber security threat landscape, but also that they have the tools and plans in place to prevent cyber attacks and security breaches. We have a lot of resources available on our website and realize the magnitude of cyber security can quickly become overwhelming. So, we wanted to take you on a ...
Read More
Topics: Staff Training, Security Threats, Data Breach, Owners & Managers, Network Security

5 Steps for Getting Your Employees Invested in Your Business's Cyber Security Initiative

Alyssa Sisco
If your employees are required to use a computer, tablet, or smartphone in order to do any aspect of their job, they absolutely need cyber security awareness training. The threat of a cyber security attack or data breach is now simply a cost of doing business in today’s world. It's no longer a question of if, now it's when will your business experience some form of cyber security attack? So, instead of leaving one of your most valuable cyber security assets defenseless in the face of phishing ...
Read More
Topics: Staff Training, Security Threats