blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

What Should I Do If My System Is Hacked?

Wynn Obermeyer
There’s no question about it — getting hacked is every business owner’s nightmare. And when one employee’s computer is compromised, it can impact your entire network, infecting computers and devices across your organization, bringing your business to a screeching halt. The good news is that there are steps you can take immediately after you’re hacked to limit the damage to your business network.
Read More
Topics: Staff Training, Security Threats, Data Breach, Network Security

Improve Password Security with These Easy Solutions

Chris Vilim
Most business owners and managers understand the important role that secure passwords play in protecting business data and accounts from being compromised. When you consider that business technology users maintain an average of 191 passwords, it only makes sense that not every organization wants to take on the considerable feat of ensuring their staff create unique and complex passwords for every application and account they have access to. Nevermind regularly updating all those passwords every ...
Read More
Topics: Staff Training, The Workplace, Network Security

How to Create an Acceptable Use Policy

Wynn Obermeyer
While technology plays an important role in keeping your organization safe from data breaches, security risks, and other malicious online behavior, it can’t do all the work by itself. The most secure companies create a culture that includes risk management, where employees are invested in taking steps toward reducing incidents by minimizing risky behavior and working to protect their technology and data assets.
Read More
Topics: Staff Training, The Workplace

What's Giving Business Owners Nightmares this October? Cyber Security Threats

Alyssa Sisco
October is Cyber Security Awareness Month! At CoreTech, we take cyber security seriously, so we talk about it A LOT. Our goal is for everyone we encounter to not only be aware of the magnitude of the cyber security threat landscape, but also that they have the tools and plans in place to prevent cyber attacks and security breaches. We have a lot of resources available on our website and realize the magnitude of cyber security can quickly become overwhelming. So, we wanted to take you on a ...
Read More
Topics: Staff Training, Security Threats, Data Breach, Owners & Managers, Network Security

5 Steps for Getting Your Employees Invested in Your Business's Cyber Security Initiative

Alyssa Sisco
If your employees are required to use a computer, tablet, or smartphone in order to do any aspect of their job, they absolutely need cyber security awareness training. The threat of a cyber security attack or data breach is now simply a cost of doing business in today’s world. It's no longer a question of if, now it's when will your business experience some form of cyber security attack? So, instead of leaving one of your most valuable cyber security assets defenseless in the face of phishing ...
Read More
Topics: Staff Training, Security Threats

How to Prevent a Ransomware Attack on Your Mobile Phone

Alyssa Sisco
Although it’s not as common as ransomware on computers, mobile phone-based ransomware is out there. A recently developed strain of SMS ransomware spreads the instant it’s clicked. It gets onto the victim’s phone, finds any and all contacts and sends all of them a personalized text message, telling them there are compromising pictures of them on an application and providing them with a link. If the recipient of the text clicks the link, not only are all their contacts now sent the same message, ...
Read More
Topics: Staff Training, Security Threats

Having Computer Problems? Restart! (Don’t Shut Down)

Galen Winkler
Why is the first thing techs ask when you're having computer problems "have you tried restarting the computer?" The main reason I (and other IT professionals) do this, is because restarting forces the computer to discard everything in active memory and reload from scratch. Not only does this correct transient issues, but it gives us the closest thing to a “known good” as we're going to get — before getting into re-installing software, changing out hardware, or the like. We understand that it ...
Read More
Topics: Staff Training

10 Most Commonly Used Brands in Phishing Attacks

Alyssa Sisco
Phishing is a common tactic used by cyber criminals, as it can be very lucrative but doesn’t require as much technical, hacking know-how as other types of cyber attacks. Hackers often bank on you recognizing a brand name and being one-of-many that have an account with that company. With this in mind they convince you that the phishing email is legitimate. Often claiming that you’ve been locked out of your account, a payment didn’t go through, you need to update your information, or anything ...
Read More
Topics: Staff Training, Security Threats, Trends

Has my email address been spoofed?

Marco Ren
If you’ve ever experienced someone complaining about you sending them “nasty” emails that you never sent – you’re not alone. Some of you may even have received an email appearing to be from yourself, claiming that your PC has been hacked and demanding a ransom in the form of bitcoin. In these situations, your email account may have been compromised. However, if you contact your IT support team and they are certain that your email is secure and has not been hacked, there is another possibility – ...
Read More
Topics: Staff Training, Security Threats

10 tips for tightening the financial controls of your business

Alyssa Sisco
Recently, it has come to light that Save the Children Federation was swindled into wiring $1 million to cybercriminals. The money was allegedly going to buy solar panels for health centers in Pakistan, which is well within the scope of the organization’s standard operations. Unfortunately, the transaction was not uncovered as fraudulent until a month after it occurred, thus they were unable to stop the cybercriminals from making off with the funds.
Read More
Topics: Staff Training, Security Threats, Owners & Managers