blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

SolarWinds Breach Underscores Need for Vigilant SMB Cyber Security Practices

CoreTech Staff
Many cyber security frontrunners and government agencies are calling the SolarWinds breach one of the most sophisticated attacks they have ever witnessed. Its global reach, to organizations of all sizes, stresses the importance of an optimized, layered cyber security strategy.   In today’s post, I’m going to detail what happened in the SolarWinds breach, why it matters and how you can keep your SMB safe from cyber security attacks with the right solutions. 
Read More
Topics: Security Threats, Data Breach, Network Security

Cyber Security Threats to Watch Out for in 2021

CoreTech Staff
2020 proved to be a difficult year for many businesses, particularly with regard to IT and cyber security. From managing remote working solutions to ensuring that IT systems were flexible to meet the ongoing uncertainty of the COVID-19 pandemic, business owners have had to make many unforeseen changes. And as the fraught year of 2020 drew to a close, a sophisticated cyberattack on third-party software from Solarwinds, used by companies large and small across the U.S., resulted in numerous ...
Read More
Topics: Security Threats, Network Security

Why Your SMB Should Care about Ransomware

CoreTech Staff
2020 has been an unexpected, topsy-turvy year for everyone running a business. From moving to remote models to digital marketing, a lot of businesses are conducting a majority of their business online.   With that digital shift comes more pronounced vulnerabilities to cyber attacks, and one of the most noteworthy tactics criminals have turned to is ransomware. In fact, it is now the most common type of cyber security incident threatening small-midsized businesses.   Read on to learn more about ...
Read More
Topics: Security Threats, Network Security

Your Business's Devices and IT Systems: Are You Taking the Right Precautions?

Wynn Obermeyer
Managing information systems and security is a top priority for every business owner in order to protect both business operations and client data. But knowing if you have the right cyber security solutions in place to provide this protection may not be readily apparent, particularly if you do not have an IT expert on your team. 
Read More
Topics: Security Threats, Network Security

Why You Need a Security Risk Assessment

Wynn Obermeyer
Cyber security remains a top concern for all businesses, big and small. After all, cyber criminals work 24/7 to steal your business data. As such, it’s imperative to routinely evaluate your cyber security to make sure it’s up to the task of warding off attacks. And while protecting your data is the ultimate goal, conducting an IT security risk assessment offers many other benefits as well. 
Read More
Topics: Security Threats, Network Security

Why Do People Fall for Phishing Scams?

CoreTech Staff
Since the start of the global pandemic, we have written numerous articles about phishing and phishing scams. By now, you know that they are prevalent, and attacks are becoming more difficult to spot, but have you ever wondered about the specifics behind why people fall for phishing scams?  We’ve detailed a few reasons below, as hackers use numerous, evolving tactics in an attempt to swindle your employees for information, or worse, access to your systems.
Read More
Topics: Staff Training, Security Threats, The Workplace

Why Does Your Organization Need Mobile Device Management?

Jason Hahn
The current popularity of remote and flexible work options marks an evolution in normal workplace practices. But, while your employees may enjoy their newfound freedom of working from mobile devices within their home office or local coffee shop, you as a business owner or manager may have some security concerns about monitoring and managing all those mobile devices. That’s where Mobile Device Management (MDM) comes into the equation.
Read More
Topics: Security Threats, Network Security, Technology Planning

Top Advantages of Managed IT Security, According to Business Leaders

Chris Vilim
Handling the daily operations of your organization is already more than enough to have on your plate, and that doesn’t take into consideration all of the IT security requirements your business needs.  By engaging an IT service provider, you put those tasks in the hands of professionals, leaving you more time and energy to focus on serving your clients. Of course, that’s just one of the many advantages of managed IT security, according to business leaders in the cyber security industry. Below, ...
Read More
Topics: Security Threats, Network Security, Outsourced IT

3 Most Common Business Network Security Threats

Wynn Obermeyer
As more companies, large and small, increasingly rely on technology and cloud computing to keep their operations running, network security demands more attention.  Small businesses in particular often don’t realize they are at risk, but external IT security threats are always present. Therefore, it’s imperative to recognize and prepare for these potential security threats to protect your clients, your employees and your business.
Read More
Topics: Security Threats

How to Avoid Falling Victim to Cryptocurrency Scams

CoreTech Staff
On July 15, a small group of hackers gained access to 130 high-profile Twitter accounts, and they perpetuated a cryptocurrency scam via the social media platform. The group made off with 12.9 Bitcoin, which, as of the exchange rate at that time, equates to around $120,000.  
Read More
Topics: Security Threats, Data Breach, Trends