CoreTech Blog

CoreTech Blog

CoreTech has been serving the Bowling Green area since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Latest Moral We Can Learn from Disney: Manage Permissions Better

The Latest Moral We Can Learn from Disney: Manage Permissions Better

The Disney brand has long cultivated an image of magic and wonder. However, this image has yet to materialize any magical effects in reality. For example, people still suffer from food allergies while visiting Disney’s various parks.

This makes it especially dangerous that a former Disney employee was allegedly still able to access a specialized menu-planning app and make alterations, like changing prices, adding language that Disney certainly would not approve of, switching text to the unintelligible “Wingdings” font, and worst of all… changing menu information.

0 Comments
Continue reading

Five Password Best Practices You Must Keep in Mind for 2024

Five Password Best Practices You Must Keep in Mind for 2024

Passwords have long been one of the central pillars of account security on the Internet. Combined with a username, they make up the foundation of most login systems. Because of this, they are a hot commodity for hackers who want to steal credentials and infiltrate accounts or networks. In recent years, however, other security measures have exposed the weakness of poor passwords for security, leading to the adoption of other measures.

0 Comments
Continue reading

Strategies to Control Your Passwords

Strategies to Control Your Passwords

Passwords are the keys to digital access, but they're often not treated as keys; meaning they aren’t always protected by their users. Unfortunately, people don’t always do everything they can to protect their passwords and there are a lot more scammers out there than pickpockets.

Effective password management is crucial for any business. It works to maintain the security of online accounts and sensitive information. Here are five ways to control and enhance your password management.

0 Comments
Continue reading

Just Because Google Chrome Offers Password Management Doesn’t Mean You Should Use It

Just Because Google Chrome Offers Password Management Doesn’t Mean You Should Use It

One of the reasons that information technology keeps changing is for the sake of the user and their convenience using it. However, if this convenience comes at the sacrifice of your business’ cybersecurity, it just isn’t worth it. This is the crux of why we always recommend that any organization seeking to use password management should invest in a reputable password management software, rather than the built-in capabilities of modern browsers.

0 Comments
Continue reading

A Cool New Security Technology May Make the Password a Thing of the Past

A Cool New Security Technology May Make the Password a Thing of the Past

Whether you love them or hate them, passwords serve an important purpose in the realm of cybersecurity. They are the first line of defense against potential threats, yet they are also notoriously easy to crack. Some of the biggest names in technology have been working on ways to get around the challenges presented by password security, including one that we are excited to highlight in today’s blog.

0 Comments
Continue reading

It’s Time to Stop Using Weak Passwords, Period

It’s Time to Stop Using Weak Passwords, Period

Simple passwords are often the bane of a business’ existence. If you routinely use strings like Password, 123456, Guest,  or Qwerty to secure an account, then you need to reexamine your password practices before they lead to a data breach. A good password can go a long way toward helping you in this effort.

0 Comments
Continue reading

Google Joins the Ranks of Businesses Considering Passwordless Authentication

Google Joins the Ranks of Businesses Considering Passwordless Authentication

Passwordless authentication has been increasingly spoken of in favor of the typical password-based method, and is gaining traction the more it is talked about. Google recently took steps toward passwordless that we felt warranted some discussion.

0 Comments
Continue reading

Could MFA’s Challenges Potentially Be Fixed?

Could MFA’s Challenges Potentially Be Fixed?

User authentication is a critical security feature for a business, specifically because it helps to minimize a significant threat to your business. This is why we’re so adamant that you should require multi-factor authentication wherever it is available… but is a better way to authenticate your users on the horizon?

0 Comments
Continue reading

Have Passwords Finally Outlived their Usefulness?

Have Passwords Finally Outlived their Usefulness?

Passwords have been a primary data security measure since 1960, when MIT researcher Fernando Corbató suggested the practice—although even he is reportedly slow to take full credit. Why? Well, if you ask Corbató (and his contemporaries, who were the first to implement passwords as we’d recognize them today), the security concerns were limited.

So, have we reached the point where it would be best to replace passwords as the default authentication measure?

0 Comments
Continue reading

Create Secure Accounts with These Strong Password Tips

Create Secure Accounts with These Strong Password Tips

Keeping a secure password is a little confusing these days, especially when the standards for what is an acceptable, complex password seem to keep shifting back and forth. Let’s take a look at some of the industry-standard best practices for passwords and how you can implement them for your business.

0 Comments
Continue reading

Tip of the Week: Properly Manage Your Browser’s Saved Passwords (or Disable The Features Entirely)

Tip of the Week: Properly Manage Your Browser’s Saved Passwords (or Disable The Features Entirely)

Most accounts these days require a password of some sort, and as such, the average user has countless of these codes that need to be kept both secure and top-of-mind. Some web browsers have built-in password management tools to help make them more user-friendly, but with so much convenience involved, one has to ask whether or not these built-in management tools are as secure as they should be.

0 Comments
Continue reading

Will We Soon Leave Passwords Behind?

Will We Soon Leave Passwords Behind?

If I were to tell you that one variable was responsible for more than 80 percent of cyberattacks, what would you guess that variable was? If you guessed “stolen access credentials,” you’d be correct. The traditional username/password combination may soon be a thing of the past as more tech companies transition to alternative authentication measures.

0 Comments
Continue reading

Do You Know How to Build Solid Passwords?

Do You Know How to Build Solid Passwords?

The password is the core element of both data security and user authentication. This makes the construction of them extremely important to protecting digital assets. Unfortunately, not everyone understands how to construct passwords that actually work to protect the information on the other side. Today, we will discuss how to build a solid password that works to keep your digital resources safe.

0 Comments
Continue reading

The Definitive Guide on Password Best Practices

The Definitive Guide on Password Best Practices

Protecting your online accounts, your data, and your customers’ information is now more important than ever. Industry and state-mandated compliances are now forcing businesses to tighten their cybersecurity, and it’s critical that every human being on the Internet take their own personal security seriously. This guide is designed to provide the best practices for strong passwords.

0 Comments
Continue reading

Tip of the Week: Taking Your Password Practices to the Next Level

Tip of the Week: Taking Your Password Practices to the Next Level

Passwords… can be annoying, if we’re being honest. They are, however, also incredibly important to your business’ overall security strategy. We’ve all heard the suggestions on how to create secure passwords. As it turns out, there is more to modern security then that. Let’s explore a few options to help you create useful passwords, and take a look why passwords are only the beginning. 

0 Comments
Continue reading

Tip of the Week: New Password Recommendations by NIST

Tip of the Week: New Password Recommendations by NIST

Passwords are always a major pain point for businesses, but in some industries, their importance is emphasized more than others. In particular, government-based organizations need to be prepared to keep more secure passwords. While we understand that not all organizations are government-based, there’s something to be said about proper password practices that we can all learn something from.

0 Comments
Continue reading

Is It Safe to Have Your Browser Remember Your Passwords?

Is It Safe to Have Your Browser Remember Your Passwords?

Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you.

0 Comments
Continue reading

Would You Fall for this Adult Scam if You Saw an Old Password?

Would You Fall for this Adult Scam if You Saw an Old Password?

As you may expect, the average Internet scammer isn’t above resorting to dirty tricks to claim their ill-gotten prize from their victims. A recent scam demonstrates just how dirty these tricks can truly be, and unfortunately, how ill-prepared many are to handle them.

0 Comments
Continue reading

Is Your Password Security Up to Par?

Is Your Password Security Up to Par?

Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be guessed by just about anyone, can you really call it a security measure? New insights from SplashData show that passwords aren’t being considered as much as they need to be.

0 Comments
Continue reading

eBay Revamps Security Protocols. Should Your Business Follow Suit?

eBay Revamps Security Protocols. Should Your Business Follow Suit?

As technology advances and allows for common pain points to be corrected, many of today’s most well-known entities will adopt new solutions to ease the experience of their customers and clients. Take, for example, eBay. The famous reselling site has been taking steps to install an assortment of new features to improve its customers’ experience.

0 Comments
Continue reading

About CoreTech

CoreTech has been serving the Kentucky area since 2006, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

Moving is already difficult, but when you factor in your business’ IT, it becomes twice as frustrating and time-consuming. You can make it easier by preparing for the job ahead of time. Today, we want to cover what you can do to prepare for a busines...

Contact Us

1711 Destiny Lane Suite 116
Bowling Green, Kentucky 42104

Mon to Fri 8:00am to 5:00pm

[email protected]

(270) 282-4926


Nashville Managed IT
Louisville and Lexington Managed IT
Bowling Green Managed IT
Clarksville Managed IT