blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Why it's Important to Have a Business Continuity Plan

Angela Wight
For most companies, building a business continuity plan is a project that will take some effort and time. So why should your business take the time to create one? Is it worth the cost of building the plan? We’ll start with some statistics for your review:
Read More
Topics: Security Threats, Data Breach

4 Reasons Your Omaha Business Needs Cyber Insurance

Angela Wight
A cybersecurity attack or data breach can result in significant financial losses and downtime for your organization. This could impact the reputation of your company and even pose challenges to business continuity. Having cyber insurance is what can protect your business from the unprecedented consequences of a cyber attack. 
Read More
Topics: Security Threats, Data Breach, Network Security

Purchasing Cyber Insurance? What SMBs Need to Know

Angela Wight
Average data breach costs rose to $4.24 million for companies surveyed globally in IBM’s 2021 Cost of a Data Breach Report. That’s a 10% increase between 2020 and 2021. In companies where remote work played a role in breaches, the average was more than 1 million higher. On average, costs in the United States are more than double the global average. For this reason, many Nebraska SMBs like yours are turning to cyber insurance to protect themselves from the adverse effects of data breaches and ...
Read More
Topics: Security Threats, Data Breach, Network Security

Data Privacy & Cyber Security Legislation: The Policies to Know

CoreTech Staff
Whether you’re referring to personal or professional information, keeping data private and confidential could be what stands between you and a cyber security attack—or a legal battle.   Either way, privacy acts are necessary for enforcing these requirements, and two of these policies have started shaping the landscape of cyber security legislation.   Note: There are a lot of acronyms associated with cyber security legislation, but I’ve done my best to keep this blog post from being just an ...
Read More
Topics: Security Threats, Owners & Managers

How Does a Dark Web Scan Work? And Why You Want One Regularly

CoreTech Staff
You know that regular monitoring and maintenance of your data and systems is important for optimal performance uptime, but you might not realize that continuous scanning, particularly Dark Web scans, can mean the difference between getting breached and preventing one.  
Read More
Topics: Security Threats, Network Security, Technology Planning

Ransomware Education and Why it Makes a Difference

Damon Hagerty
A comprehensive cyber security training program goes far in securing systems and keeping employees aware of the latest threats. “One of our clients using cyber security training saw a significant reduction in employees opening phishing emails from 22% to 2% in only 2 months. This is lower than the industry average of 19.3%. Training has made a huge impact on the organizations we work with.” - CoreTech 
Read More
Topics: Staff Training, Security Threats, Network Security

7 Things for Sale on the Dark Web Right Now

CoreTech Staff
There are thousands upon thousands of items sold on the dark web daily, and we’ve detailed seven of them in the post below.  
Read More
Topics: Security Threats, Network Security

What is Ransomware-as-a-Service (RaaS)?

CoreTech Staff
Ransomware has now become the largest cyber security threat to businesses.  With worldwide attention from attacks such as JBS, Colonial Pipeline and most recently, Kaseya VSA, it seems ransomware is making headlines every day.  However, these high profile attacks not only showcase how advanced ransomware has become, but also the extensive damage it can have. 
Read More
Topics: Security Threats, Trends

How Do Hackers Use Social Media Profiling?

CoreTech Staff
Staying in touch with family and friends, surfing through the latest batch of memes, or even interacting with our favorite brands—social media is ubiquitous in the world today. It’s all about sharing, and, well, socializing.   While social media does have a good purpose, there are, unsurprisingly, threat actors who use all that shared information for nefarious purposes.  
Read More
Topics: Security Threats

The Details You Need to Know about the REvil Ransomware Attack on Kaseya

CoreTech Staff
While the rest of us were heading off to celebrate the 4th of July with a long weekend, threat actors were hard at work on yet another cyber security attack.  
Read More
Topics: Security Threats, Data Breach, Network Security