POST
Welcome to POST by ResTech Solutions
Thank you for subscribing to our newsletter. Every week we will bring you new content covering recent events and news related to technology, Microsoft, Apple, Google, tips & tricks, useful information, and more! To read the full articles in our newsletters you can either click on the image or article headline. We've had a great response each week to our newsletter and we've been hard at work to bring you even more great information this week. Please let us know what you've enjoyed thus far about our newsletter. To see past issues click on the archives link above.
Why the name POST? In the world of computers POST stands for Power On Self Test. This is the action computers take when they are first powered on to check their basic functionality prior to loading the operating system. We decided to take this same concept and to provide you with useful technology information at the beginning of your week to help get you started. POST is also a term associated with news as well and we felt this was an appropriate and fitting name.
If you have suggestions about topics you are interested in or would like more information on any of the articles presented in our newsletters you can fill out our Content Request form to let us know what you would like to know.
Reply to this email to let us know what you liked. Please forward this newsletter to anyone who needs this information.
The best thank you that you can give us is by sending us referrals. It means so much to receive a referral. We look forward to having you with us every week! Let's POST and get started with this issue.
News
The Windows 10 'May 2021 Update' is official, and it's coming soon
Image from Windows Central
The next Windows feature update will officially be rolling out this month and will be known as the May 2021 Update. As we previously mentioned this will be a relatively small and minor feature update. This small size of the update is likely due to the forthcoming feature update that will be out later this year around the fall/winter. We already know the next update will be a major update with a massive design update for Windows.
Cyber Security
Why you should not use your work equipment for personal use
It is always good practice to not mix your work and personal files and web surfing. With many working remote for the past year plus these lines have very likely blurred. You may be thinking what harm could it do? There are many potential reasons why.
- Your personal activities are generally less secure than your work activities.
- By using your work computer to access and perform personal tasks you are risking your personal privacy as many businesses have the right to inspect company property.
- You could compromise your business systems by accidently introducing a virus or hacker via non-work approved activities and files.
- If you store personal files and information on a work system they could be lost if/when the business decides to wipe or reset a system. You could also lose information if you have to switch machines.
Generally this kind of mixing between work and personal use is frowned upon. Always check your company policies to know how you can use and access work resources and data.
Heading off insider risk in the hybrid workplace
Image from Quartz
The abrupt shift from structured, contained workplaces to remote work has put more sensitive information in harm’s way. A single workforce might connect to multiple networks, accessing confidential materials on unauthorized devices, saving sensitive documents to personal USB drives and cloud storage, and leaving plenty of opportunities for insider risk or threats from within your organization overlooked. These threats can cause damage to your corporate reputation, cost millions to repair, and create a massive liability.
Check out the linked article for full details. If you need or would like a review of your environment for any insider risks please reach out and we will be glad to help.
Forget Ransomware, Microsoft Says Cryptojacking Is Our Biggest Threat
Image from MUO
With the every increasing popularity and number of cryptocurrencies the threat of cryptojaccking is surpassing other threats such as ransomware. Cryptocurrency is obtaining by mining it and that requires the use of hardware. If your environment is hacked to use your hardware for mining cryptocurrency you will likely experience hardware related performance issues. This could lead to other hacks or compromises as well.
Check out the linked article for more details. If you have been neglecting your security recently please use this as a wakeup call. The cryptocurrency miners will try to get at as much hardware as they can, hacking into your systems, and usually those with less security are easier targets for them.
Do you need a review of your security? Reach out and will will be happy to schedule a review.
What is Cryptocurrency? Check out this article to learn more.
Windows
Windows 10: The best tricks, tips, and tweaks
Image from PC World
Today we are bringing you another round of Windows tips and tricks. Checked out the linked article for full details.
6 Ways to Copy Files Faster in Windows 10
Image from MUO
If you've every sat and waited, and waited, for a file transfer to complete then this tips will be super helpful to you. Do note that transfer speeds will also be affected by the size of the data and number of files to be transferred as well as the source and destination locations. Check out the linked article for full details.
Apple
How to Answer Calls With Your Voice in iOS 14.5
Image from Lifehacker
If you've recently updated your iPhone to iOS 14.5 and own one of six models of Apple/Powerbeats headphones then you now have the ability to answer or decline a call hands free without having to go through Siri, at least you will not have to say "Hey Siri". Check out the linked article for the list of supported headphones and for the steps to enable the new feature.
Tips & Tricks
How to Stop Facebook From Spying on Your Internet Activity
Image from PCMag
If you are not aware you have the ability to prevent Facebook from tracking your activities outside of Facebook. If you are wary of being tracked and having Facebook know about much of your online activity and habits then you can tell Facebook to stop tracking you. The linked article provides step-by-step instructions with images to walk you through adjusting these settings.
How to Take Screenshots on a Mac
Image from Gizmodo
If you are a Mac user this linked article will provide you with several keyboard shortcuts that should provide a boost to your productivity.
FAQ of the Week
How to spot an online scam: 3 dead giveaways
Image from PC World
Each week we will address a frequently asked question. This week we are looking at how to spot an online scam.
There are many ways you can check to see if you are being scammed. One of the most common ways scams have taken place is with a 'bad' link on the web or in your email. If you are unsure about any link you can hover over it and get a tool tip that will pop up on your screen showing you the actual URL or website the link will take you to. Double check that you recognize the main website address in the link and there is no misspelling.
Another common scam, you may receive an legitimate looking email that is informing you of some issue and you need to provide the company your information to validate yourself or your account. Companies will never ask for any account or personal information via email. Again if you have any concerns do not click on any links and either go directly to the company's website yourself and log into your account or call customer service.
Check out the linked article for more dead giveaways of an online scam. If you need any assistance with determining if you may be getting scammed please reach out and we will be happy to help.