blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

How to Prevent a Ransomware Attack on Your Mobile Phone

CoreTech Staff
Although it’s not as common as ransomware on computers, mobile phone-based ransomware is out there. A recently developed strain of SMS ransomware spreads the instant it’s clicked. It gets onto the victim’s phone, finds any and all contacts and sends all of them a personalized text message, telling them there are compromising pictures of them on an application and providing them with a link. If the recipient of the text clicks the link, not only are all their contacts now sent the same message, ...
Read More
Topics: Staff Training, Security Threats

Having Computer Problems? Restart! (Don’t Shut Down)

CoreTech Staff
Why is the first thing techs ask when you're having computer problems "Have you tried restarting the computer?" The main reason I (and other IT professionals) do this, is because restarting forces the computer to discard everything in active memory and reload from scratch. Not only does this correct transient issues, but it gives us the closest thing to a “known good” as we're going to get — before getting into re-installing software, changing out hardware, or the like. We understand that it ...
Read More
Topics: Staff Training

10 Most Commonly Used Brands in Phishing Attacks

CoreTech Staff
Phishing is a common tactic used by cyber criminals, as it can be very lucrative but doesn’t require as much technical, hacking know-how as other types of cyber attacks. Hackers often bank on you recognizing a brand name and being one-of-many that have an account with that company. With this in mind they convince you that the phishing email is legitimate. Often claiming that you’ve been locked out of your account, a payment didn’t go through, you need to update your information, or anything ...
Read More
Topics: Staff Training, Security Threats, Trends

Has My Email Address Been Spoofed?

CoreTech Staff
If you’ve ever experienced someone complaining about you sending them “nasty” emails that you never sent – you’re not alone. Some of you may have even received an email appearing to be from yourself, claiming that your PC has been hacked and demanding a ransom in the form of bitcoin. In these situations, your email account may have been compromised. However, if you contact your IT support team and they are certain that your email is secure and has not been hacked, there is another possibility: ...
Read More
Topics: Staff Training, Security Threats

10 Tips for Tightening the Financial Controls of Your Business

CoreTech Staff
Recently, it has come to light that Save the Children Federation was swindled into wiring $1 million to cybercriminals. The money was allegedly going to buy solar panels for health centers in Pakistan, which is well within the scope of the organization’s standard operations. Unfortunately, the transaction was not uncovered as fraudulent until a month after it occurred, thus they were unable to stop the cybercriminals from making off with the funds.
Read More
Topics: Staff Training, Security Threats, Owners & Managers

How to enable LastPass autofill on your phone (iOS & Android)

CoreTech Staff
Once you start using LastPass, you don't want to stop using it. Yes, it's that helpful! The autofill feature makes it incredibly easy to log in to any account, while keeping your usernames and passwords secure. But did you know you can also use it on your phone? LastPass features allow you to not only log in to online accounts, but also log in to smartphone applications. Follow these steps to enable autofill on your Android and iOS devices.
Read More
Topics: Staff Training

Are you an easy target for phishing scams?

CoreTech Staff
The sole objective of any phishing email is to trick you into clicking it. If you aren't vigilant, it can be easy to fall for. It doesn't matter who you are, how much money you have, or what company you work for, you can be targeted and it's important to know how to protect yourself. Since Amazon and Uber are so well-known and widely-used, cybercriminals have often chosen them to impersonate. Their aim? To lull you into a false sense of security at seeing the familiar brand name. With the ...
Read More
Topics: Staff Training, Security Threats, Network Security

What Does A Typical Cybercrime Operation Look Like?

CoreTech Staff
Erase the stereotypical image of a lone, hooded man sitting in a dark room, stealing information to exploit for money. Cybercrime has become a well-oiled machine comprised of networks of organized tiers. In essence an unethical, service-based corporation, everyone has a specific job that contributes to the success of the business. Some cybercriminals are experts in hacking and stealing information, while others are good at turning that data into profit. Unfortunately for us, they have all found ...
Read More
Topics: Staff Training

Is Your Inbox A Crime Scene? 6 Ways to Evaluate Potential Phishing Scams

CoreTech Staff
Much like the shiny lures fishermen use to attract their prey, cybercriminals use email attachments or links to try to get you to click through to malicious content. Often using cheap scare tactics, phishing scams induce a quick, panicked response by making you feel like you have something to lose by not clicking on the link. However, the instant you click, you open yourself up to malware attacks that can cost you financially and reputationally, and it will definitely eat up time to reverse the ...
Read More
Topics: Staff Training, Security Threats

How to set your favorite search engine as your default

CoreTech Staff
When you open up your web browser with the intent to search for something, it can be irritating to have  your computer open a search engine you don't like or are not familiar with. Those who regularly search for information on the web usually have a preferred search engine. Below you will find some steps to take when your web browser default is not what you want it to be.
Read More
Topics: Staff Training