POST
Welcome to POST by ResTech Solutions
Thank you for subscribing to our newsletter. Every week we will bring you new content covering recent events and news related to technology, Microsoft, Apple, Google, tips & tricks, useful information, and more! To read the full articles in our newsletters you can either click on the image or article headline. We've had a great response each week to our newsletter and we've been hard at work to bring you even more great information this week. Please let us know what you've enjoyed thus far about our newsletter. To see past issues click on the archives link above.
Why the name POST? In the world of computers POST stands for Power On Self Test. This is the action computers take when they are first powered on to check their basic functionality prior to loading the operating system. We decided to take this same concept and to provide you with useful technology information at the beginning of your week to help get you started. POST is also a term associated with news as well and we felt this was an appropriate and fitting name.
If you have suggestions about topics you are interested in or would like more information on any of the articles presented in our newsletters you can fill out our Content Request form to let us know what you would like to know.
Do you need any help or assistance with any item in our newsletter? Reach out and we will be happy to help.
Reply to this email to let us know what you liked. Please forward this newsletter to anyone who needs this information.
The best thank you that you can give us is by sending us referrals. It means so much to receive a referral. We look forward to having you with us every week! Let's POST and get started with this issue.
News
CISA, FBI, and NSA Release Conti Ransomware Advisory to Help Organizations Reduce Risk of Attack > National Security Agency/Central Security Service > Article
Image from NSA
The Conti ransomware attacks have increased and The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA) have released an advisory about the Conti ransomware attacks. More information can be found in the linked article.
This is an important reminder that all individuals and businesses need to have a robust set of cybersecurity protections for their systems and data. The cost to protect against a ransomware attack is minimal compared to what it will cost to recover from an attack. Don't wait, take action NOW!
Over 10M Android Phones Infected With GriftHorse Malware
Image from PC Mag
If you are an Android user you will want to check if you have installed any of the apps listed in this post. If you had or have any of the apps installed on your Android phone you will want delete the app and then check if you were signed up for the premium SMS service.
Cyber Security
5 Surefire Things That’ll Get You Targeted by Ransomware
Image from MUO
Ransomware can cause all sorts of chaos when it infects your system. Did you know there are certain things that will make you a target for ransomware?
- Keeping Proprietary Data on Your Computer - Yes, this can be necessary but you need to take precautions to limit your exposure. Encrypt your data and/or system, use a VPN, or keep data on a secured remote/cloud location.
- Linking Your Identity to Your Digital Profiles All the Time - There are times when this is necessary, such as using sites like LinkedIn. You should limit how often you link your identity. If putting it out there has no relevance to the online activity then don't do it.
- Reusing Passwords - This is a big one. If one login gets compromised then that password/login will be tried on multiple systems. Use a password manager and only use randomly generated complex passwords where possible.
- Posting on Shady Websites - Just don't do this. If you are not sure about a site or if it seems too good to be true then stay away.
- Talking to the Wrong People - This should be obvious but it can be hard sometimes to know who you are interacting with online. If you don't know the other person then don't interact with them if it can be avoided. At a minimum do not share any information that you don't want your worst enemy to have.
By playing it safe you can reduce your risk of attracting ransomware.
5 Steps for Securing Your Remote Work Space
Image from PC Mag
When working remote it is important to have a secured work space. Remote workers are more vulnerable when they are away from the office and the security measures in place there to protect all workers. There are many tools and practices that can be used to help secure a remote workspace. Check out the linked article for ways to secure your remote workspace.
8 Ways Your WhatsApp Messages Can Be Hacked
Image from MUO
When using a third party service for communications, especially for business, it is important to know if the system is as secure as the company claims. In the case of WhatsApp the system is not as secure as you may think. Not only can your message be hacked but there are also many scammers on the system as well.
If you need the ability to provide a secure way for customers to do business with you over text we recommend looking for other alternatives. One option is to get a business VoIP system that has texting capabilities as part of the system. Check out the linked article to learn how WhatsApp messages can be hacked.
Hackers Are Now Targeting Expired Driving Licenses: Here's Why
Image from MUO
Due to the pandemic many states paused driving license renewals. This has left many with expired licenses and now that states are resuming renewals scammers are taking advantage of the situation. These scammers are sending messages that look legitimate and coming from the DMV.
If you get any message about an issue with you drivers license your best course of action is to reach out directly to your DMV, especially if you are unsure about where the message came from. Most DMVs will only communicate via a mailed letter and not over email or text.
How Thieves Are Borrowing Phones and Emptying Bank Accounts
Image from MUO
This scam is very effective. Check the linked article for full details on how this scam works.
Since we all have a lot of personal and sensitive information on our phones it is best not to just let anyone use it let alone a random stranger. If someone truly needs to use your phone it would be best to hang onto the phone and offer to place the call for them on speaker so you don't have to hand over your phone.
Luckily, this is one of the easier scams to avoid. Once you're aware of its existence, it's just a matter of never giving your phone to a stranger for any reason. It's also a good idea to be suspicious of anyone who asks you to do otherwise.
6 Ways Your Email Address Can Be Exploited by Scammers
Image from MUO
Your email contains a lot of information about you and your activities. It is also the key to many of your accounts. If a scammer gets your email they can do the following:
- Impersonate you
- Crack passwords on your other accounts
- Use it to crack email-based two-factor authentication
- Collect sensitive information
- Steal your identity
- Learn when you are out
If you believe your email account has been compromised in any way you should immediately change your password. Many email systems now offer two-factor authentication and you should set it up to further secure your account. Having 2FA enabled can also potentially protect your account from the scammers before they ever attempt to get access. Knowing what scammers can do with your email and how to protect your account is important. Check out the linked article for more details.
Apple
How to Designate an 'Account Recovery Contact' So You Don't Get Locked Out of Your Apple ID Forever
Image from Lifehacker
If you are an Apple user you will have an Apple ID. If you get locked out of your Apple ID account it can be hard to impossible to recover your account. With the release of iOS 15 you can now designate an account recovery contact.
With this latest iOS update, Apple is adding a feature called “Account Recovery Contacts.” This option allows you to designate one or more of your contacts to act as a recovery contact for your Apple ID account, so long as they are at least 13 years old and have an Apple device of their own. If you ever forget your password or device passcode, you can reach out to a recovery contact to help you get back in.
Your recovery contact does not have access to any of your data; rather, they only have the tools to help you recover your data and get back into your account. So don’t worry—your friends won’t have access to any of your messages, photos, contacts, or any other data tied to your Apple ID and iCloud account.
Check out the linked article for instruction on how to setup account recovery contacts.
FAQ of the Week
How to Fix “There Was a Problem Resetting Your PC” Error?
Image from MUO
Each week we will address a frequently asked question. This week we are looking at fixing PC resetting errors.
When your Windows 10 computer becomes unstable you will want to use the built-in reset option but when the reset option runs into an error itself you need to be able to resolve the issue so you can reset the system. Windows has many built-in tools that you can run to help diagnose and resolve the issue.
- System File Checker
- System Restore
- Startup Repair Tool
- Other system tools and commands
Usually one or a combination of the above items will clear the issue. Many of the above items can also be used to help resolve other system issues if you are not ready to perform a system reset. Check out the linked article for details on using the system tools and resources.