Welcome to POST by ResTech Solutions
Thank you for subscribing to our newsletter. Every week we will bring you new content covering recent events and news related to technology, Microsoft, Apple, Google, tips & tricks, useful information, and more! To read the full articles in our newsletters you can either click on the image or article headline. We've had a great response each week to our newsletter and we've been hard at work to bring you even more great information this week. Please let us know what you've enjoyed thus far about our newsletter. To see past issues click on the archives link above.
Why the name POST? In the world of computers POST stands for Power On Self Test. This is the action computers take when they are first powered on to check their basic functionality prior to loading the operating system. We decided to take this same concept and to provide you with useful technology information at the beginning of your week to help get you started. POST is also a term associated with news as well and we felt this was an appropriate and fitting name.
If you have suggestions about topics you are interested in or would like more information on any of the articles presented in our newsletters you can fill out our Content Request form to let us know what you would like to know.
Do you need any help or assistance with any item in our newsletter? Reach out and we will be happy to help.
Reply to this email to let us know what you liked. Please forward this newsletter to anyone who needs this information.
The best thank you that you can give us is by sending us referrals. It means so much to receive a referral. We look forward to having you with us every week! Let's POST and get started with this issue.
Interpol Says Email Fraud Operation Resulted In 1,000 Arrests and $27 Million Seized
Image from Gizmodo
Earlier this year Interpol made over 1,000 arrests related to business email compromise scams and seized over $27 Million.
Interpol, which is not a police force but an international organization that coordinates action by police across member countries.
What is Business Email Compromise (BEC)? Read more about BEC from the FBI.
BEC is a major concern and the noted Interpol operation was the second of such operations they conducted. It is important to know how to recognize these scams and how to protect against them. We see these emails come through every day in our email filter. Check out the linked FBI resource for some good information on BEC. We are also available to answer any questions or concerns about this serious threat.
Hackers Don’t Bother Trying to Guess Strong Passwords, New Research Shows
Image from Bitdefender
Numerous times we have stressed the need to be using long complex passwords to protect your accounts. New research put out by Microsoft supports this and shows hackers are primarily targeting short, weak passwords.
77% of attempts used a password between 1 and 7 characters. A password over 10 characters was only seen in 6% of cases.
The longer and more complex a password is the less likely a hacker will attempt to guess the password. While these passwords may be more difficult to remember and keep track of you can accomplish this by using a password manager (something else we've stressed multiple times).
How to Tell If Your Phone Is Tapped: 7 Warning Signs
Image from MUO
With the increasing rate of cyberattacks, there has also been a growing concern about mobile phones being compromised. There are some signs you can look out for to know if your phone has been "tapped".
- Battery Problems
- Increased Mobile Data Usage
- Unwanted Ads and Apps
- General Performance Issues
- Strange Messages
- Websites Look Different
- Call Forwarding
Most users will not experience issues with their phone being tapped but it is good to know what to look for and how to address any potential compromise. Check out the linked article for full details.
11 Security Checks Everyone Should Perform Regularly
Image from MUO
Regular security checks are important to keep your systems and data secured and in good working condition. Many of these checks are simple and quick and can make a difference in stopping a small issue from becoming a serious problem. Some of these tasks can even be automated to run on a regular basis. Here are the common items:
- Apply Updates for Everything (can be automated)
- Use a Password Manager to Change Your Weak Passwords
- Review Social Media Privacy Settings
- Check App Permissions
- Review Running Processes on Your PC (can be automated)
- Scan for malware (can be automated)
- Check Your Account Connections
- Set Up Two-Factor Authentication Everywhere
- Review Account Activity
- See Who's Using Your Wi-Fi
- Uninstall Old Apps
Check out the linked article for full details.
Microsoft will now snitch on you at work like never before
Image from ZDNet
With some planning upcoming additions Microsoft has lined up for its 365 platform company administrators will be granted more insights into some of the online activities of its employees and their use of company data.
There are pros and cons to this and I will not argue either here but just stating facts. Due to the increased nature of cybersecurity threats and insider threats businesses need additional ways to protect themselves and their employees. The #1 threat to a business is people whether the person's actions are intentional or unintentional. When these tools are used properly they will help a business better protect itself. This could also have a negative effect if a business uses these tools in ways not intended which could be bad for the employee. Knowing about these upcoming changes/additions may also help dissuade employees from performing non-work-related activities or nefarious actions.
I would like to hear your thoughts on this. What do you think of these upcoming additions?
Windows 11 is getting some much-needed taskbar and Start menu improvements
Image from The Verge
With the initial release of Windows 11, there were some very obvious features missing that have been a part of Windows 10. These features include:
- Showing the clock and date on all monitors
- Drag and drop files onto taskbar apps
- General customization options
Some of the missing features are relatively minor but can make the system more user-friendly. We plan to start testing Windows 11 internally around the new year and will have our own insights to share. Until then we are still recommending to wait on upgrading if you are currently eligible. If you do decide to upgrade you should first check to ensure all your existing applications will support Windows 11. You should also read up on the changes you will experience with Windows 11.
You will be able to continue using Windows 10 and Microsoft will continue to support Windows 10 through October 2025.
Take Back Control Over Driver Updates in Windows 10
Image from MUO
What is a Driver? It is a software program that enables proper functionality of a piece of hardware with the computer's operating system. For a more detailed description check out the definitions from TechTerms.
Why is this important? If the correct driver for a piece of hardware is not installed then the device may not function at all or may not function correctly. When a driver does cause an issue there are several ways to address the issue and even prevent the driver from getting reinstalled.
Check out the linked article for more information on undoing and preventing driver updates, replacing a driver, blocking a driver update, and stopping automatic driver updates.
Tips & Tricks
How to Troubleshoot a Faulty Windows PC
Image from MUO
Computers have many components and when you run into an issue there could be a number of reasons why something went wrong. Knowing where to start with your troubleshooting is important as it can save time. The first thing you should always do is reboot. A reboot will usually solve about half of the issues you run into. Beyond rebooting you need to take a systemic approach to troubleshoot and resolve your computer issue. The linked article has several tips to walk you through this process.
If at any time you feel overwhelmed by this process or find it to be beyond your capabilities do not hesitate to reach out to us or your IT provider for assistance.
The 8 Massive Technology Trends Set for 2022
Image from MUO
As we wrap up the year and start looking to the next it is important to know what technology trends to expect. Here is what you can expect in 2022:
- Augmented Reality in Online Shopping
- Sustainability in Tech
- Low-Code and No-Code Software
- 5G Becoming Mainstream
- AI Everywhere
- PasswordLess Authentication
- Virtual Fashion
- Virtual Reality for Everyone
Check out the linked article to reach more about these trends.
FAQ of the Week
How Do Password Managers Work?
Image from MUO
Each week we will address a frequently asked question. This week we are looking at password managers.
Password managers work by helping you manage your passwords. They can generate and store complex passwords and help autofill them for you when needed. The goal of a password manager is to remember a password for you so you do not have to. You only need to know your master password. Many password managers also come with additional features that make them more useful beyond your passwords.
Depending on the type of password manager you use there may be additional nuances. I highly recommend reading the linked article for the full details.