POST
Welcome to POST by ResTech Solutions
Thank you for subscribing to our newsletter. Every week we will bring you new content covering recent events and news related to technology, Microsoft, Apple, Google, tips & tricks, useful information, and more! To read the full articles in our newsletters you can either click on the image or article headline. We've had a great response each week to our newsletter and we've been hard at work to bring you even more great information this week. Please let us know what you've enjoyed thus far about our newsletter. To see past issues click on the archives link above.
Why the name POST? In the world of computers POST stands for Power On Self Test. This is the action computers take when they are first powered on to check their basic functionality prior to loading the operating system. We decided to take this same concept and to provide you with useful technology information at the beginning of your week to help get you started. POST is also a term associated with news as well and we felt this was an appropriate and fitting name.
If you have suggestions about topics you are interested in or would like more information on any of the articles presented in our newsletters you can fill out our Content Request form to let us know what you would like to know.
Do you need any help or assistance with any item in our newsletter? Reach out and we will be happy to help.
Reply to this email to let us know what you liked. Please forward this newsletter to anyone who needs this information.
The best thank you that you can give us is by sending us referrals. It means so much to receive a referral. We look forward to having you with us every week! Let's POST and get started with this issue.
Cyber Security
What Is Multi-Factor Authentication? Why Should You Use It?
Image from MUO
A username and password are no longer enough to secure an account. Cybercriminals are able to easily get this information from any number of data breaches across multiple companies. Users also tend to reuse credentials for multiple accounts. Once a cybercriminal gets one set of credentials they will try it on multiple sites and services.
Multi-Factor Authentication or MFA helps to address this problem by requiring a second form of identification when you log into an account. This is done, typically through a piece of hardware, you have with you - such as your phone to verify you are the person logging in. This is done via SMS, an authentication app, or biometric authentication.
If someone tries to access your MFA-enabled account you will get an alert and instantly know someone tried to get into your account and your credentials were compromised.
3 Ways Your SIM Card Can Be Hacked (And How to Protect It)
Image from MUO
The SIM card on your phone can be hacked and is vulnerable. There are ways to protect your SIM card. Check out the linked article for full details.
Here's Why You Need to Store Back-Ups on External Devices
Image from MUO
The point of backing up your data is simple. Should something happen to a file or your device you can simply replace the content from the backup. This is oversimplified but essentially how it works.
If you store your backup on the device you are backing up then the backup will not be very effective. Should something happen to the device the backup can also be rendered useless or missing along with the device if it is stolen.
Best practice is to follow the 3-2-1 method. Have one primary backup and 2 additional copies of your data. Save your backups on two different types of media. One backup should be stored offsite.
10 Steps to Take After a Ransomware Attack
Image from MUO
If you or your business suffered a Ransomware attack you will need to take action to recover as quickly as possible.
NEVER pay the ransom. Paying the ransom does not guarantee you will be able to recover your data. Check out the linked article for the list of steps you should take. You should also report the incident to the proper authorities.
How Hackers Are Using Our Own Technology Against Us
Image from MUO
The technology we use every day is designed to help us and (usually) make our lives easier. This same technology can be exploited and used against us. There are steps you can take to help mitigate or reduce these risks. Check out the linked article for details.
Windows
Why Does Windows 11 Need TPM 2.0?
Image from MUO
The Trusted Platform Module (TPM) is a small chip, either on your CPU or as part of your motherboard. And while it’s not a spectacular piece of hardware, it plays an important role in your computer security.
The TPM is a cryptoprocessor that uses a cryptographic key to protect your data. As such, it increases your computer’s security by adding hardware-based security.
This requirement is all about security to protect you and your data. Check out the linked article for additional details.
Huge Windows 11 preview fixes glaring flaws, adds a slew of new features
Image from PCWorld
Microsoft continues to improve and enhance Windows 11. Windows 11 has been available for nearly 6 months now. If you have a compatible computer and have been on the fence about upgrading from Windows 10 to Windows 11 you can upgrade knowing that the improvements have made Windows 11 more useable than when it first came out. Microsoft will continue to release updates for Windows 11.
Useful Information
NAS vs. the Cloud: Which Remote Storage Is Right for You?
Image from MUO
Network Attached Storage (NAS) straddles the line between a local hard drive and cloud storage and gives you the benefits of both.
A NAS system includes a processor, memory, and space for hard drive storage connected to a local network so that it can be accessed remotely, either through connected computers or wireless devices.
There are several factors to consider when deciding between NAS and the Cloud.
- Security
- Ease of use
- Backup and reliability
- Performance
- Price
If you are more concerned about where your data is stored and who can access it then a NAS solution will give you more control. For full details check out the linked article.
Why Most Smartphones Don't Have Removable Batteries Anymore
Image from MUO
I'm sure many of you have wondered why today's phones no longer have removable batteries. There are many reasons that have contributed to this. One of the main reasons is to help reduce the overall size of the device. This is also for your protection as a thinner device means the battery would no longer have a hard plastic case to prevent damage. You can read more about this in the linked article.
FAQ of the Week
How to Maintain an Effective Backup Schedule (and Why You Should)
Image from MUO
Each week we will address a frequently asked question. This week we are looking at how to maintain a backup schedule and why it is important.
Our digital data is always vulnerable. Should a system fail, suffer water, fire, or electric damage, or be stolen our data can be lost. There are also requirements in many industries that state data must be kept for X number of years.
Data backups allow up to protect against the many risks and satisfy data requirements and make it easy to transfer and restore data as needed.
Scheduling backups automate the backup process and the frequency of the backup will depend on the business need, compliance policies, and how much new and changed data is generated throughout the day.
Check out the linked article for additional detaisl.