5 Reasons You Need Cyber Security in the Workplace

5 Reasons You Need Cyber Security in the workplace Banner

Cyber Security’s Importance in the Workplace

Cyber attacks continue to rise and pose significant threats in the workplace. Cyber security has previously not been a priority for many businesses. Small businesses are particularly vulnerable to cyber threats, as many of these businesses do not have the resources to hire an in-house IT team. However, choosing to partner with CoreRecon will give your company access to the ultimate protection against cyber criminals through the use of real-time monitoring, data backups, cloud technology, employee training, help desk support, and much more.

Are you interested in learning more about cyber security and CoreRecon? Here are five reasons you should invest in cyber security in the workplace.

Reason #1: Reduced Downtime

One of the essential advantages of focusing on cyber security in the workplace is that it significantly decreases your company’s downtime. Any cyber attack can disrupt daily business operations and make it almost impossible to serve clients. However, CoreRecon will automatically download the latest critical security updates and proactively monitor your network at all times to keep downtime to a minimum in the workplace. CoreRecon has the resources to reduce downtime for your business. 

Reason #2: Focusing on Cyber Security Shields Confidential Information

An added perk of cyber security is that it keeps your confidential information secure and out of the hands of cybercriminals. Cyber attacks strive to access personal information, such as phishing scams that target unsuspecting employees and appear to be legitimate emails. CoreRecon provides training to educate employees on the many dangers of cyber attacks and the best way to avoid becoming the next victim. Another perk of our cyber security services is identifying a malicious phishing email and removing it from every mailbox in the company to prevent a cyber attack. 

Reason #3: Enhances Employee Productivity

A computer infected with malware operates much slower and makes it difficult for employees to remain productive. However, CoreRecon installs advanced security software to automatically scan and remove viruses, malware, trojans, and many other malicious attacks. A computer free from any malicious software operates much quicker and allows employees to be much more productive.

Reason #4: Protects the Company’s Reputation

A cyber attack can ruin any business’s reliability and make it challenging to recover clients’ trust. However, CoreRecon plays a crucial role in keeping your company well-protected from a wide range of cyber threats in the workplace. A strong reputation for your business makes it much more likely to entice new customers while also developing long-lasting relationships with each client.

Reason #5: Having a Peace of Mind

CoreRecon gives your business the peace of mind to know that you will always stay one step ahead of cyber threats in the workplace. We offer a wide range of services to keep you protected and proactively look for ways to improve your company’s cyber security support. This proactive strategy to cyber security will give you peace of mind to know that your business is always secure from cybercriminals’ malicious schemes.

Cyber security offers a wide range of benefits for businesses. Making cyber security a priority will lessen downtime, preserve confidential data, increase productivity, protect business reputation, and give you much-needed peace of mind. Of course, new cyber threats will only continue to evolve in the workplace, but the team at CoreReocn will significantly improve your cyber security defenses in today’s work environment.

Please give us a call if you are interested in our services or just have questions: 361-248-3258

Can’t give us a call? Don’t worry we have an email as well info@corerecon.com

We also have social media so if you’d like to stay in touch with our day to day go ahead and follow us:

Facebook: CoreReconTX

Twitter: @CoreRecon

Instagram: @corerecon

You can reach out to us on there as well if you’d like. We just want to ensure that you and your business remain safe. Thanks for reading!

For more of our blog, go to corerecon.com/blog

Are Random Password Generators Safe?

Many people look to random password generators to produce a password that will be hard to guess. The idea of a generator is to generate a password that is not easy to guess. A lot of people tend to use personal information that is easy to obtain via social media. An important concept to grasp from this is not to use any publicly known information as a password. However, the question remains, are random password generators safe? The answer is yes, and no. Let’s clarify why it can go either way.

A random password generator is secure to use because it does not include any private information as a password. A lot of people tend to post a lot of information on social media; examples include pet names, nicknames, parent’s names, and so forth. Not to say that you shouldn’t post any information you want, just don’t incorporate that information into your password. Hackers use social engineering to crack passwords, so by adding personal data, the door is left wide open to compromise your accounts.

Now let’s explore how a random password generator can be unsafe. While generating a password online, there is no clear cut way to distinguish if your password stays on that website. Yikes, not another compromised case for your business to stress over. However, having good cybersecurity policies and an IT company with strict password policies can help prevent that from happening. When utilizing a random generator, it’s essential to keep the passwords longer than twelve characters and change your password every six months. By implementing these policies, your accounts will be secure due to not using your dog’s name as your password.

CoreRecon has specialists who are accustomed to how passwords can be compromised. We have tools that help discover whether you have had your password compromised. We are here to keep your data and your business protected. Trust CoreRecon to ensure your business is not the next headline because company data was compromised. Our staff is highly skilled and equipped to prevent situations like this from occurring. If you have any questions or would like to know more information on the services we provide, feel free to contact us at 361-248-3258. We are available 24/7 for your IT and cybersecurity demands.

361-248-3258 | info@corerecon.com

Zoom: How Do You Use It?

What is Zoom? Zoom is a video-conferencing application that allows online meetings, chat, and collaborations. Many teachers are using Zoom as their classroom, which allows students to be more involved. Many judges in Texas are beginning to use Zoom as their virtual courtroom. Zoom is available on Windows, macOS, iOS, and Androids. Many people are using Zoom to communicate with each other and just allowing there to be collaboration during the stay-at-home or shelter-in-place order It’s an excellent way to continue to keep in contact the way you need to while social distancing.

Let’s cut to the chase, how do you use Zoom? First, make sure you sign up for an account or log on. If it’s work-related definitely recommend a login with your work email.

Screenshot of the sign-up page

Next is to get logged in and start working. In order to understand Zoom a little better, it’s essential to play with it a bit and get familiar with the website.

There are multiple features included in Zoom. You can either host or join a meeting. Join a meeting by clicking, “Join a meeting”. You will then be prompted with a pop up that states to enter your “meeting ID” this should be provided by the host of the meeting. Next, you join, and congratulations you’re now attending a Zoom meeting. Another feature is to start your own meeting. To do this you will click the “Host a meeting,” this is where you will see various options about the video, audio, and screen sharing. Be extra careful because by sharing your screen it will allow the attendees to have access to your screen. Make sure that you do not have personal or private information on your screen anywhere. By doing this it will allow you to keep your personal data safe. It’s also essential to mark the meeting private if you do not want anyone other than the people you are inviting to be in attendance.

Overall, using Zoom is a great way to practice social distancing. When used correctly, it is beneficial. I have included below a link to a website which provides some do’s and don’t’s of video conferencing. If you need help with remote work, please do not hesitate to give us a call, we are always available to assist. Stay safe and healthy! Thanks for reading.

Contact CoreRecon at 3612483258, available 24/7. #CorpusChristi #Texas

Link to article with do’s and don’t’s

Follow CoreRecon on Twitter: https://twitter.com/CoreRecon
Facebook: https://www.facebook.com/CoreReconCyberSec
Instagram: http://instagram.com/corerecon

Coronavirus and Cybersecurity

As the Coronavirus pandemic swings into full effect, most businesses are closing down. Many people are being forced to work from home for social distancing purposes. Working from home is convenient, but convenience isn’t always secure. Using remote desktop can be dangerous because someone can hack into your pc and steal your companies data if you are not using a secure connection. Now is the time that hackers will be working harder. That has many people asking, what can be done to ensure data safety?

There is a screen sharing software that can be used to access your desktop from work. Another way to work from home safely is to use a VPN. Using a VPN allows there to be a layer of security over your companies information.

VPN (Virtual Private Network): “allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more…”


VPN access can get given by your IT provider. VPNs in the business setting allow access to company data via a firewall. This allows you to work from home and access your files while remaining protected. Firewalls are essential to protect your company’s data. A firewall is your business’s first line of defense.

Firewall: ” a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules”


Coronavirus has instilled much panic and fear everywhere. The last thing on your mind should be your business exploited as a result. Contact CoreRecon to ensure your company’s data stays safe while you work from home. We are available 24/7 to help you keep your business safe. Remember to wash your hands, stay home if you feel sick, and stay safe. As Matthew McConaughey said, “every red light turns to a green light”.

As for our customers, we will be here 24/7 to help you with any issues and questions you have regarding working from home. Please contact us if you have any questions.

Thanks for reading!

Don’t be the next headline!

Contact CoreRecon at 3612483258 or info@corerecon.com

Follow CoreRecon on Twitter: https://twitter.com/CoreRecon
Facebook: https://www.facebook.com/CoreReconCyberSec
Instagram: http://instagram.com/corerecon

TikTok and Its Hidden Vulnerabilities

Many people are using TikTok these days. If you haven’t heard of TikTok, you are part of the rare crowd. TikTok is video-sharing social networking, basically the new Vine. There are over 1.5 billion uses globe-wide within a two and a half year span.  TikTok has spread to Facebook, Twitter, and even Instagram.

How can hackers use TikTok to hurt users:

  • Manipulating content in Tik Tok user accounts
  • Erasing videos
  • Uploading unapproved videos
  • Changing private videos to be publicly available
  • Expose private information like personal email addresses


How are they doing this?? By sending malicious links with spoofed messages, they are gaining access to TikTok profiles. Social engineering is also a way that hackers are getting access to TikTok user profiles.

Since TikTok has been looking to grow quickly, they have not given security vulnerabilities much needed attention. However, back in 2019, TikTok was fined 5.7 million dollars for collecting personal information illegally from minors. *Yikes* Soldiers are not permitted to make TikTok’s while in uniform. The Navy and the Army have banned the application on December 30th. 

It has many vulnerabilities, and it has the potential to be very risky for minors. Parents, please monitor your children’s TikTok. Very important to follow your children’s social media and make sure they are not being taken advantage of. Thanks for reading!

Don’t be the next headline, contact CoreRecon at 3612483258

Big thanks to Medium for providing this insightful information. 

Photo creds to Wikimedia Commons for the TikTok logo

Follow CoreRecon on Twitter: https://twitter.com/CoreRecon
Facebook: https://www.facebook.com/CoreReconCyberSec
Instagram: http://instagram.com/corerecon

Ransomware Continues to Wreak Havoc

Ransomware is  “malware that requires the victim to pay a ransom to access encrypted files” (Merriam-Webster).


I’m sure you’ve heard the term ransomware countless times this past year alone. Over the past couple of years, ransomware has continued to evolve. If the trend continues, ransomware will not be going away anytime soon; in fact, it appears that it is beginning to become more frequent. Ransomware began as a threat to consumers. The idea was to trick people into paying fines that were not real and purchase infected equipment.

These days ransomware attacks are “becoming more targetedsophisticated and costly, even as the overall frequency of attacks remains consistent” (IC3).


 Impacted in 2019 by ransomware:

  • 113 government agencies, municipalities and state governments
  • 764 healthcare providers
  • 89 universities/colleges
  • School districts with up to 1,233 individual schools were potentially impacted.

Cybersecurity must be one of the top priorities when it comes to any establishment that holds personal data. Public institutions are usually the main culprit for ransomware because there is typically a lack of funding allocated for cybersecurity.

The best way to keep this from happening to your business is to call CoreRecon. We provide security assessments for your network infrastructure. We also are an MSP, which means we can be your IT support and help educate employees on safe desktop practices. The most important thing for us is to keep your business and your data safe.

Don’t be the next headline, thanks for reading!

Contact CoreRecon at 3612483258

Available 24/7 | info@corerecon.com

Follow us on Twitter: twitter.com/corerecon

Follow us on Instagram: instagram.com/corerecon

Like us on Facebook: www.facebook.com/CoreReconCyberSec/

Wait, the Healthcare Industry Still Uses CDs?

The healthcare industry is still using CDs

Many people have stopped using CD-ROMS, mostly because it’s a lot easier to either save it on a thumb drive or just save it to the cloud. Many people have become migrating to the cloud and it’s beneficial mostly because work can be done virtually anywhere with an internet connection. A lot of PCs and laptops do not come with CD drives anymore. Overall, it’s beginning to become obsolete. This means that if a place needs to view CDs they must purchase an external disc drive. Downloading and burning CDs is also time-consuming as well.

So why are some people still using CDs? If you work in the healthcare industry then you know that CDs are essential in the workplace. They are vital because radiologists must use these to store medical images. The reason that the healthcare industry must use CDs is that not all doctors use the same software. The only way these images can be viewed anywhere is with a CD-ROM. The downside to a thumb drive is some lack the space capacity for these images. Let’s open our minds and think of the future. In fact, the cloud is the future of the healthcare industry. Technology continues to evolve and so should we.

However, there is now a group dubbed Ditch the Disk*. They are all for heading to the cloud and trying to get rid of the use of CDs. Is it time to say goodbye to CD-ROMs? Let me know what you think below. Thanks for reading!

Follow CoreRecon on Twitter: https://twitter.com/CoreRecon

Facebook: https://www.facebook.com/CoreReconCyberSec

Instagram: http://instagram.com/corerecon

Creds to https://www.cnbc.com/2020/02/14/salesforce-cmo-ashwini-zenooz-urges-healthcare-to-move-on-from-cd-roms.html for bringing the movement to our attention.

*Find out more about Ditch the Disk at https://ditchthedisk.com/

Ransomware Hackers Continue to Evolve

A new hacking tactic has surfaced, and it is infecting PCs at an alarming rate. Ransomware “gangs” have begun using drivers to infect PCs. Currently, they are using GIGABYTE technology to infiltrate networks. GIGABYTE is a leading computer hardware company. They build motherboards, graphics cards, and more. Chances are you have a piece of GIGABYTE hardware in your PC right now. Unfortunately, instead of releasing a patch for the vulnerability within the software, GIGABYTE maintained that its products were unaffected.

The hackers are using GIGABYTE drivers to gain access to PCs and disable security products so their actions can remain hidden. With security products enabled, the hackers would not be able to access PCs as easily. 

A security company has recently released the method of the new tactic.**

  1. Ransomware gang gets a foothold on a victim’s network.
  2. Hackers install legitimate Gigabyte kernel driver GDRV.SYS.
  3. Hackers exploit a vulnerability in this legitimate driver to gain kernel access.
  4. Attackers use the kernel access to disable the Windows OS driver signature enforcement temporarily.
  5. Hackers install a malicious kernel driver named RBNL.SYS.
  6. Attackers use this driver to disable or stop antivirus and other security products running on an infected host.
  7. Hackers execute the RobbinHood* ransomware and encrypt the victim’s files.

Therefore, files are encrypted and inaccessible, this is a result of the hack. 

*RobbinHood is ransomware that currently does not have a public decryption key. Without the public decryption key, there are minimal ways that data restoration can occur unless the affected users pay for the attackers’ private key.

However, that does mean that our security experts are unable to crack it. In these perilous times with technological warfare, it is essential to get a security assessment. Contact CoreRecon to ensure that your network and your company remain safe during this dangerous time. Please don’t wait until it’s too late, call 3612483248 for more information on our cybersecurity services. 

Twitter: @Corerecon

Facebook: https://www.facebook.com/CoreReconCyberSec/

Instagram: https://www.instagram.com/corerecon/

**More information on new hacking tactic:

Wanna see how easy it is to get your website hacked?

Local SEO is just one of the many IT services we provide as a Managed Services Provider.

One of our clients made an error by using a VOIP business phone service that, while the price was “right”, the service did not meet their requirements. CoreRecon had listed the company’s phone number in dozens of internet business listing directories ( in Local SEO parlance, these are known as Citations ).

So our client was forced to get a new phone service and needed CoreRecon to update about 75 listings across the web.

To double check, we googled the old number just to make sure the directories had updated and there were no straggler listings, to our amazement, we stumbled upon a list of what purports to be dozens of previously cracked MySQL database passwords

Cracked MySQL passwords
Cracked MySQL passwords posted to Google for anyone to see


It is not only that easy for hackers to crack the hashes that conceal the passwords to your company’s vital databases, but those nefarious players freely share this info among themselves and do so right out in the open on Google




Call CoreRecon at 800.955.2596 to find out about getting a security assessment for your organization today
(361( 248-3258

Ransomware infects Colorado Department of Transportation

SamSam ransomware is back and the Colorado Department of Transportation is its most recent victim. More than 2,000 agency computers had to be shut down on Feb 21 to prevent the ransomware from spreading across the entire infrastructure.

According to CBS local news, the critical systems used to manage road traffic and alerts were not affected. The attackers encrypted some files and requested bitcoin in exchange for the decryption key.

Although DoT is working with a security company to repair the system, the FBI was also called in for further investigation of the damage.

“Early this morning state security tools detected that a ransomware virus had infected systems at the Colorado Department of Transportation. The state moved quickly to quarantine the systems to prevent further spread of the virus,” said David McCurdy, OIT’s Chief Technology Officer.

“OIT, FBI and other security agencies are working together to determine a root cause analysis. This ransomware virus was a variant and the state worked with its antivirus software provider to implement a fix today. The state has robust backup and security tools and has no intention of paying ransomware. Teams will continue to monitor the situation closely and will be working into the night.”

Colorado Department of Transportation is one of the many organizations that fell victim to SamSam ransomware that in January infected vulnerable networks in hospitals, city councils, educational facilities and transportation systems.

Following its infection with SamSam and the encryption of over 1,400 files, a hospital in Indiana paid $55,000 to restore its systems. In that case, although they had data backups, they chose to pay the ransom. SamSam doesn’t spread via phishing campaigns but takes advantage of unsecured devices directly connected to the internet and uses them to spread laterally across the network.

711 North Carancahua Street STE 300
Corpus Christi, TX 78401
Fax: 800.955.2596