POST
Special Announcement
You are invited to attend one of two webinars for Accountants, CPAs, Lawyers, and Business Professionals covering this current and urgent topic:
“What Can You do to Prevent a Cyber Attack on your Data and Computers?”
- The first webinar will be held on Tuesday, July 27th from 7:00 – 8:00 pm. You can register here.
- The second webinar will be held on Thursday, July 29th from 10:00 – 11:00 am. You can register here.
David Levine, Founder & CEO of ResTech Solutions, will be presenting. ResTech Solutions is a Managed IT Service provider that has been helping businesses in Houston, TX since 2011.
Here is what happened to one accounting firm:
Squar Milner is one of the largest accounting firms in the United States offering wealth management, auditing, tax services, CFO advisory, and bankruptcy services. On March 25, 2020, the firm experienced inexplicable technical difficulties which led them to discover a data breach affecting their clients. The information possibly accessed by the hackers includes full names, addresses, social security numbers, Tax ID numbers, IRS filing information, and state tax submissions. Squar Milner is now covering the costs of 12 months of credit monitoring, dark web monitoring, and identity recovery services for the exposed individuals (clients).
If you cannot attend, you can let someone in your office who is concerned with your data and computer systems attend. Seating is limited.
Welcome to POST by ResTech Solutions
Thank you for subscribing to our newsletter. Every week we will bring you new content covering recent events and news related to technology, Microsoft, Apple, Google, tips & tricks, useful information, and more! To read the full articles in our newsletters you can either click on the image or article headline. We've had a great response each week to our newsletter and we've been hard at work to bring you even more great information this week. Please let us know what you've enjoyed thus far about our newsletter. To see past issues click on the archives link above.
Why the name POST? In the world of computers POST stands for Power On Self Test. This is the action computers take when they are first powered on to check their basic functionality prior to loading the operating system. We decided to take this same concept and to provide you with useful technology information at the beginning of your week to help get you started. POST is also a term associated with news as well and we felt this was an appropriate and fitting name.
If you have suggestions about topics you are interested in or would like more information on any of the articles presented in our newsletters you can fill out our Content Request form to let us know what you would like to know.
Do you need any help or assistance with any item in our newsletter? Reach out and we will be happy to help.
Reply to this email to let us know what you liked. Please forward this newsletter to anyone who needs this information.
The best thank you that you can give us is by sending us referrals. It means so much to receive a referral. We look forward to having you with us every week! Let's POST and get started with this issue.
News
We're Getting Closer to Electronic Paper That Can Display as Many Colors as an LCD Display
Image from Gizmodo
This is an exciting development. As we rely more and more on our mobile devices we want them to be more efficient so they will last longer on a charge. One item that uses a significant amount of power is the display. Devices like the Amazon Kindle use an e-ink display which requires much less power than the displays currently used on most mobile devices. E-ink displays have mostly been black and white as well, no color. Eventually, we may see devices with screens that will have this new color electronic paper. This will also open up the possibility for different types of devices and wearables with screens.
Um, This Phone Will Send Your Location Data to China
Image from PCMag
If you know of anyone who has a Jethro SC490 phone they need to run the firmware update released on June 23rd to disable the location services that had been sending location data to China. These phones are aimed at US senior citizens.
The SC490's situation shows one danger of buying low-cost uncertified phones from lesser-known brands in the US. Many of those phones come from China, and the companies involved may cut corners and not properly rewrite their software for American needs.
Cyber Security
Malware for Macs Is Getting Bigger, More Dangerous, and It's Dirt Cheap
Image from Gizmodo
The days of Macs being known for having little to no viruses and malware are over. Macs were never immune but there were fewer viruses and malware written for Macs which gave the illusion that they were safer. Now that more and more users are adopting Macs they are being targeted more. This malware is also cheap to buy and easy to use.
The same precautions that Windows users take need to be adopted by Mac users as well. Macs truly need to have virus and malware protection installed at a minimum. Mac users can no longer assume that they are more protected because they have a Mac. This is not true today and never was true. In the past Macs were not as high of a target as Windows devices were. That has all changed. Take action now and secure your Mac!
Microsoft
9 Useful OneDrive Tips to Get the Most Out of Your Account
Image from MUO
Many of these tips apply to both Personal and Business OneDrive accounts. Check out the linked article for full details.
Windows
How to Find and Disable Ads in Windows 10: 6 Places to Look
Image from MUO
Today we see ads just about everywhere on our devices. For years it has been commonplace to see ads while browsing the internet, in mobile apps - mostly free apps, and even on some streaming platforms. The one place we used to not see ads was on our computer's operating system. With the increase in online services tied into the OS and the adoption of the subscription model, ads have unfortunately made their way onto Windows itself. It is possible to block or disable these ads. Check out the linked article for full details.
How to Protect Yourself From the New Windows 10 and 11 Security Bug
Image from Lifehacker
With any major piece of software, such as the Windows operating system, there are bound to be bugs or flaws in the software that could allow for unintended actions to occur. Some may be minor and others could be serious security issues. The severity will depend on what can happen and how easy it would be to exploit the issue. This latest bug is serious but so far there have been no exploits.
According to Microsoft’s bug report, the vulnerability stems from “overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database.” The bug has not been successfully exploited, but Microsoft’s report cautions that such an attack is “likely” given how severe the vulnerability is. In order to execute an attack, the attacker would need direct access to a person’s computer—either physically, or by tricking them into downloading malware-laden files. Once a hacker has access, they can give themselves full administrator controls and “install programs; view, change, or delete data; or create new accounts with full user rights.”
This bug will get patched but until it does it is important to remain extra vigilant and use common sense. Don't click on unknown links, open unknown emails or attachments, and don't download anything unless you know what it is. As always you should have a robust set of security tools such as anti-virus software protecting your system and data.
The Best Google Search Cheat Sheet: Tips, Operators, and Commands to Know
Image from MUO
Google search is still the most popular search engine and one of the best out there. When you know how to use the Google search shortcuts it can become an even more powerful tool. Check out the linked article for a list of the shortcuts.
Useful Information
NFC vs. Bluetooth: What Are the Differences?
Image from MUO
NFC, Near Field Communication, and Bluetooth are very similar technologies but have different uses based on how each technology works. Checked out the linked article for full details.
What’s the Difference Between a Monitor and a TV?
Image from MUO
This is something we see on a somewhat regular basis. When someone wants or needs a larger screen for their computer they will connect a TV. TVs don't always have a high enough resolution or the correct ratio to display the computer's output and many times the output will look distorted or stretched. There are many factors that will help to determine which is best for your needs and this is covered in detail in the linked article.
Televisions and monitors are very similar. They are both visual output devices and are often interchangeable. The difference is what they’re designed to do. Monitors are typically designed to sit on a desk for close viewing. They are connected to other hardware (such as a computer) to display graphical information.
In comparison, a TV is usually a standalone monitor designed for viewing much further away. TVs have in-built radio frequency tuners and other hardware to pick up cable and satellite broadcasting.
FAQ of the Week
How to Clean Up Your Computer to Its Original State (Without Reinstalling Windows)
Image from MUO
Each week we will address a frequently asked question. This week we are looking at how to clean or reset a computer to its original state without having to reinstall Windows.
Since Windows 10 was released there has been a built-in feature to essentially reset or restore Windows. There are two options, one will allow you to keep your files and the other will essentially reinstall Windows and wipe all files and programs that were not originally installed on the computer. Both of these options essentially perform a reinstall of Windows but you don't have to download anything or use a disk. This is the best option if you want to get back to a "day one" type of setup.
Most other options help to clean up Windows but will not return it to its original state.