Phishing Evolves: Best Practices to Avoid Being Phished

A few weeks into my tenure at Core Technologies, I received an email from Fidelity alerting me that my 401(k) account needed action.  It stated that I needed to activate my account within 2 weeks or I would lose matching for the year.  Being new to the company, I didn’t want to miss out on this opportunity.  I remember thinking …

Ransomeware Threats on the Rise in 2017

What does the cloud, “Breaking Bad”, Australia, and bitcoins all have in common? If you are up-to-date on current cyberattack trends around the world, you may have heard about the “Breaking Bad” themed ransomware attack currently spreading like wildfire through Australian computer systems. Ransomware is a type of extortion software that infects a computer system to lock down and scramble …

Do Ex-Employees Still Have Access to Your Corporate Data?

Organizations of all sizes have a problem that most of them are not addressing adequately: their employees store corporate data on various file-sharing and content access platforms and most of these people still have access to this data after they are no longer employees. Worse, much of this data in what Osterman Research is calling “rogue applications” is sensitive or …

EIS

GSA Awards 10 Enterprise Infrastructure Solutions Contracts August 1, 2017 15-year, $50 billion contract provides agencies with comprehensive mission-critical IT & telecom services WASHINGTON, D.C. – The U.S. General Services Administration (GSA) today announced awards for the new 15-year, $50 billion Enterprise Infrastructure Solution (EIS) contract. EIS is a government-wide contract that provides federal agencies with mission-critical telecommunications, infrastructure, and …

HIPPA Compliant Office in the Cloud

When I’m talking with our customers and partners about healthcare and HIPAA, a frequent question is “What about your cloud-based voice services?  Are they compliant with HIPAA requirements?” Discussing HIPAA requirements to protect sensitive patient information often starts with documents and email, so the implications for voice and hosted PBX may not be as obvious. But you need to look …