News

Phishing Evolves: Best Practices to Avoid Being Phished

Phishing Evolves: Best Practices to Avoid Being Phished

A few weeks into my tenure at Core Technologies, I received an email from Fidelity alerting me that my 401(k) account needed action.  It stated that I needed to activate my account within 2 weeks or I would lose matching for the year.  Being new to the company, I...

read more

EIS

GSA Awards 10 Enterprise Infrastructure Solutions Contracts August 1, 2017 15-year, $50 billion contract provides agencies with comprehensive mission-critical IT & telecom services WASHINGTON, D.C. – The U.S. General Services Administration (GSA) today announced...

read more
Exchange 2003’s End-of-Life: One Month Later

Exchange 2003’s End-of-Life: One Month Later

It’s been a month since Microsoft ended support for Exchange 2003. I’ve seen quite a few articles and forum threads offering instructions for upgrading on-premises Exchange 2003 to Exchange 2010 or 2013. And from what I gather reading the forums, a lot of folks are...

read more
Get the best of both worlds: SecuriSync & File Servers

Get the best of both worlds: SecuriSync & File Servers

Traditional file servers became popular in the business world because they facilitate access to files inside a company’s network. But businesses have evolved, and employees need mobile access to files from the device of their choice. File servers cannot meet the...

read more
Ransomeware Threats on the Rise in 2017

Ransomeware Threats on the Rise in 2017

What does the cloud, “Breaking Bad”, Australia, and bitcoins all have in common? If you are up-to-date on current cyberattack trends around the world, you may have heard about the “Breaking Bad” themed ransomware attack currently spreading like wildfire through...

read more
HIPPA Compliant Office in the Cloud

HIPPA Compliant Office in the Cloud

When I’m talking with our customers and partners about healthcare and HIPAA, a frequent question is “What about your cloud-based voice services?  Are they compliant with HIPAA requirements?” Discussing HIPAA requirements to protect sensitive patient information often...

read more
What is Active Directory and why is it so important?

What is Active Directory and why is it so important?

You might hear people talk about Active Directory™. Sometimes they refer to it as “AD”. Active Directory is a Microsoft® software that organizes and provides access to information in an operation system’s directory. It is a link between “objects” and “values”. That...

read more
What you need to know about the VENOM security flaw

What you need to know about the VENOM security flaw

Another month, another mega-vulnerability. If you haven’t already heard about the VENOM vulnerability, you will. It’s being compared to Heartbleed and could have widespread security implications for cloud service providers. It’s certainly the largest vulnerability...

read more
Do Ex-Employees Still Have Access to Your Corporate Data?

Do Ex-Employees Still Have Access to Your Corporate Data?

Organizations of all sizes have a problem that most of them are not addressing adequately: their employees store corporate data on various file-sharing and content access platforms and most of these people still have access to this data after they are no longer...

read more
Who Creates Risk in Your Organization?

Who Creates Risk in Your Organization?

The New York Post broke incredible news this week: the AOL email account of the Director of the CIA was hacked. By a teen. Who “social engineered” Verizon to get the password. Now, every element of that story in and of itself is already incredible. But what made our...

read more

A Great VoIP Experience Starts with Great QoS

When you pick up your phone you expect to hear that familiar dial tone sound and expect to be able to clearly hear the person on the other side, right? When that doesn’t happen, it’s a Quality of Service (QoS) issue, and we know how frustrating these types of problems...

read more

What do SMBs really know about Hosted Phone Systems?

When 74 percent of small and medium-sized businesses rank voice communications as “extremely important to business operations” — you’d imagine that the adoption of cloud-based phone systems would be relatively high. But in the case of hosted PBX, IP telephony and...

read more

Pin It on Pinterest

Core Technologies, Inc.
Phishing Evolves: Best Practices to Avoid Being Phished
Exchange 2003’s End-of-Life: One Month Later
Get the best of both worlds: SecuriSync & File Servers
Ransomeware Threats on the Rise in 2017
HIPPA Compliant Office in the Cloud
What is Active Directory and why is it so important?
What you need to know about the VENOM security flaw
Do Ex-Employees Still Have Access to Your Corporate Data?
Who Creates Risk in Your Organization?
Share This