POST
Welcome to POST by ResTech Solutions
Thank you for subscribing to our newsletter. Every week we will bring you new content covering recent events and news related to technology, Microsoft, Apple, Google, tips & tricks, useful information, and more! To read the full articles in our newsletters you can either click on the image or article headline. We've had a great response each week to our newsletter and we've been hard at work to bring you even more great information this week. Please let us know what you've enjoyed thus far about our newsletter. To see past issues click on the archives link above.
Why the name POST? In the world of computers POST stands for Power On Self Test. This is the action computers take when they are first powered on to check their basic functionality prior to loading the operating system. We decided to take this same concept and to provide you with useful technology information at the beginning of your week to help get you started. POST is also a term associated with news as well and we felt this was an appropriate and fitting name.
If you have suggestions about topics you are interested in or would like more information on any of the articles presented in our newsletters you can fill out our Content Request form to let us know what you would like to know.
Do you need any help or assistance with any item in our newsletter? Reach out and we will be happy to help.
Reply to this email to let us know what you liked. Please forward this newsletter to anyone who needs this information.
The best thank you that you can give us is by sending us referrals. It means so much to receive a referral. We look forward to having you with us every week! Let's POST and get started with this issue.
Cyber Security
Your Printer Contains Sensitive Data: 4 Ways to Safely Get Rid of It
Image from MUO
Printers are attractive targets for hackers because they contain sensitive information, although most people underestimate this. They can store usernames, passwords, credit card numbers, social security numbers, and other personal details.
How BIMI Will Make It Easier to Trust Email Messages
Image from How-To Geek
The vast majority of online scams are conducted via email as the medium is readily accessible and easy to abuse. A new form of message authentication known as BIMI should help you understand which messages are genuine and which are trying to deceive you.
Microsoft
Microsoft Create Is Here to Revamp Office Templates
Image from How-To Geek
Templates have been a core feature of the Microsoft Office suite for years, giving people an easy way to make better-looking presentations and papers. Now the company has consolidated its templates in one place: Microsoft Create.
Windows
Get Ready to See Popup Tips on Your Windows 11 Taskbar
Image from How-To Geek
Windows 11 introduced an all-new taskbar and Start Menu, which was one of the update’s most controversial changes. Now there’s another change coming to the taskbar: old-fashioned floating tooltips.
Apple
iPhone 14 Satellite SOS Feature Is Coming in November
Image from How-To Geek
One of the biggest improvements to the iPhone 14 was the introduction of a new Satellite SOS feature, allowing you to get help and access to emergency services outside of cell tower range. Soon, you’ll actually be able to use it.
Tips & Tricks
8 Ways to Stop Your Laptop From Murdering Your Back
Image from How-To Geek
Laptops are a little technological miracle and oh-so-handy to have around, but they can do a real number on your back. Here’s how to avoid that.
5 Mistakes to Avoid When Buying a MicroSD Card
Image from MUO
Whether you need it for a phone, a camera, or some other gadget, shopping for a microSD card may seem like a pretty simple thing to do.
Useful Information
Zoom Is Becoming a Full Productivity Suite
Image from How-To Geek
You might know Zoom for its videoconferencing solution that became wildly popular during the COVID-19 pandemic, but as we start taking on more in-person commitments, videoconferencing isn’t as essential. Now, Zoom is branching out.
5 Things You Should Have in Your Blackout Emergency Bag
Image from How-To Geek
Nothing makes you realize how dependent we are on electricity like it suddenly going away when you least expect it. Plenty of great gadgets can help make a blackout easier to get through, but we think a few are essential.
FAQ of the Week
What Is a Trojan Horse in Cybersecurity? How Does It Work?
Image from MUO
When you hear the term "Trojan Horse", you'll likely think of the ancient Greek myth, in which the city of Troy is invaded via an elusive trick using a large statue of a wooden horse. But this term also has relevance in the cybersecurity realm. So, what is a Trojan Horse in this sense, and how does it work?