Phishing Evolves: Best Practices to Avoid Being Phished

A few weeks into my tenure at Core Technologies, I received an email from Fidelity alerting me that my 401(k) account needed action.  It stated that I needed to activate my account within 2 weeks or I would lose matching for the year.  Being new to the company, I didn’t want to miss out on this opportunity.  I remember thinking …

Ransomeware Threats on the Rise in 2017

What does the cloud, “Breaking Bad”, Australia, and bitcoins all have in common? If you are up-to-date on current cyberattack trends around the world, you may have heard about the “Breaking Bad” themed ransomware attack currently spreading like wildfire through Australian computer systems. Ransomware is a type of extortion software that infects a computer system to lock down and scramble …

Do Ex-Employees Still Have Access to Your Corporate Data?

Organizations of all sizes have a problem that most of them are not addressing adequately: their employees store corporate data on various file-sharing and content access platforms and most of these people still have access to this data after they are no longer employees. Worse, much of this data in what Osterman Research is calling “rogue applications” is sensitive or …

Who Creates Risk in Your Organization?

The New York Post broke incredible news this week: the AOL email account of the Director of the CIA was hacked. By a teen. Who “social engineered” Verizon to get the password. Now, every element of that story in and of itself is already incredible. But what made our jaws truly drop was the revelation that the teen discovered sensitive …

A Great VoIP Experience Starts with Great QoS

When you pick up your phone you expect to hear that familiar dial tone sound and expect to be able to clearly hear the person on the other side, right? When that doesn’t happen, it’s a Quality of Service (QoS) issue, and we know how frustrating these types of problems can be. In the old days of Ma Bell, copper …