blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Protect yourself from ransomware (crypto) and other threats

Travis Gordon
The data thieves are preying on us and ransomware is a predominant threat. Following the simple guidelines below, at work and at home, will go a long way to protect your data. Before we start in though, what is ransomware? It is a type of malicious software designed to block access to a computer system until a sum of money is paid. Be suspicious The best way to avoid viruses is to be aware that most infections occur through social engineering. This means an attacker relies on a person, and ...
Read More
Topics: Security Threats

BEC fraud: The threat you can't afford to ignore

Brooke Nielsen
Business E-mail Compromise (BEC), commonly known as “CEO fraud,” is a rapidly increasing concern affecting companies’ financial and data security today. What exactly is BEC? It has been defined as a scam that targets businesses working with foreign suppliers and/or businesses that regularly use wire transfer payments. Scammers skillfully gain access to and impersonate company executives, attorneys, or suppliers through e-mails to fraudulently authorize the transfer of company funds. Payments ...
Read More
Topics: Staff Training, Security Threats, Data Breach

Arm your employees with these 5 key security basics

Vee Figueroa
There are numerous ways owners and managers protect their company from security threats. Hopefully you recognize some of these security solutions which include: use of a commercial grade firewall, endpoint protection software, proper patching, updating software programs, and—last but not least—strong data backup.   All these security solutions are key to securing your network and data, however one task often ignored is employee education!  As an employer you will want to be certain your ...
Read More
Topics: Staff Training, Security Threats

Is your network security worth the investment?

Tom Montgomery
IT support companies and consultants, like CoreTech, talk a great deal about network security and the impact it can have on your business. We also instruct and educate on the importance of antivirus software, Microsoft security updates, firewalls and data backup. The initial investment in these security solutions may seem daunting, however given the consequences of a security breach or downtime you understand the justification. But then you are reminded the investment is ongoing—ouch! As ...
Read More
Topics: Security Threats

Don't let USB flash drives ruin your day

Brooke Nielsen
Recently, the American Dental Association (ADA) has fallen victim to a security breach by mailing out malware infected flash drives. The drives were supposed to contain “Dental Procedure Codes,” to be shared with and utilized by dental offices nationwide. After receiving the media, some recipients were directed to a site that was frequently associated with malware. This incident is just one example of how susceptible USB flash drives are to viruses. Imagine how many times you’ve plugged your ...
Read More
Topics: Security Threats

How to avoid mobile security risks in 2016

Megan Thiemann
Keeping private information safe has always been a priority, however more than ever, smartphone threat protection is of the utmost importance. According to Pew Research Center, 68 percent of American adults own a smartphone. This number only continues to grow as more businesses adopt the idea of BYOD. The more that employees and contractors use mobile devices to access organizational systems, application and data, the more important it is to protect such access. Here are CoreTech’s tips on how ...
Read More
Topics: Staff Training, Security Threats

The increasing cost of a data breach

Tom Montgomery
We hear about hacking and compromised information at large organizations, yet what is the impact to small and midsize businesses (SMBs)? The article below provides insight on the impact a data breach may have on a business. In addition to citing the increasing costs of data breaches, there are a number of other factors listed which SMBs need to consider the impact of as well.
Read More
Topics: Security Threats, Data Breach

The Anatomy of a Phishing Email

Vee Figueroa
It’s exciting to receive a package in the mail with new products or deals I’ve found during some online shopping. So when I received an email about an undeliverable package to my work email address (and I was expecting a package, which was overdue), I almost didn’t think twice about it. And then, I began to wonder about the email address and was pretty certain I supplied my home email when ordering online.
Read More
Topics: Staff Training, Security Threats