It’s Not a Nigerian Prince! How to Tell if You’re Being Scammed in 4 Simple Steps
An alarming number of Americans are scammed each year. According to the United States Senate, seniors lose nearly $3 billion per year due to scams. Many people have heard of the Nigerian prince scam. Here, a (fake) "member of the Nigerian royal family" promises to...
How to Protect Business Data Security and Privacy
Nearly half of all cybercrime targets small businesses. In fact, approximately 60 percent of all businesses will experience a cyberattack during their lifetime. And, these attacks have the potential to cripple business operations. In some cases, an attack can cost...
Break-Fix vs. Managed Services: Everything You Need to Know
There are over 1 billion computers in use around the world. Many of them are used by businesses. If you use computers to manage your business you need to find a way to maintain both the computers and the software that you use. There are two main options you should...
The Top Email Scams (And How to Avoid Them)
Most of us know not to respond to emails from a Nigerian prince looking to enter a business proposition but email scams have come a long way from when that one started surfacing. It's difficult to see through some of the latest attempts to swindle and trick you out of...
The Benefits of VoIP Telecommunications for Your Business
Every business needs a way to communicate with employees, vendors, and clients, no matter how big or small it is. But despite technology getting better and better, the majority of companies are stuck with traditional landlines. An alternative to consider is VoIP, or...
Cyber Security Vulnerabilities 5 Biggest Issues Facing Your Small Business
Cyber Security Vulnerabilities Businesses are growing more competitive. Threats of hackers altering, stealing, or destroying information systems have increased. Safety of information is the number one priority given an increased market size. Cyber security...
Is Your Business Ready for Hurricane Season?
Hurricane season is in full swing. Hurricane Florence is barreling towards the Carolinas and there are three other systems being watched. Most coastal residents have some idea as to how to prepare their houses and other buildings for hurricanes, but what about your...
Have You Tried Rebooting It?
It’s stereotyped as the favorite question of IT help desk people: “Have you turned it off and back on?” On the surface, it seems like a ridiculous question. How on earth could rebooting a device possibly fix anything? And yet, it does. I’ll explain, and hopefully...
FBI Warns of ATM “Jackpotting” Threat
About a week ago, some scary information started making the rounds. The Telegraph reported that the FBI had issued warnings that there would potentially be a hacking attacking on ATMs worldwide. There was a threat that hackers would be unleashing a “jackpotting”...
The Alphabet Soup of VoIP
If you have read some of our older blog posts, you may realize that we at Core Networks are fans of VoIP. However, if you have stumbled across our blog to read some of our newer posts, you probably don’t understand what VoIP is, other than some fancy type of...
Translating IP Addresses to Binary
In our last post we discussed the differences between MAC and IP addresses. In this post we'll delve deeper into IP addresses. Specifically, this post is going to focus on how to translate IP addresses into their original binary numbers. An IP address looks...
MAC vs IP Address
I figured I’d give you all a break from malware and talk about something different. In that spirit, I’m doing a little post about IP addresses and MAC addresses. I'm going explain the difference between MAC and IP addresses by starting with question: “What is an IP...